On correlating network traffic for cyber threat intelligence: A Bloom filter approach.
Adil AtifiElias Bou-HarbPublished in: IWCMC (2017)
Keyphrases
- network traffic
- bloom filter
- cyber crime
- intrusion detection
- cyber security
- data structure
- crime investigation
- intrusion detection system
- record linkage
- anomaly detection
- network security
- network monitoring
- traffic data
- computer networks
- network management
- internet traffic
- network traffic data
- network intrusion detection
- traffic analysis
- network bandwidth
- membership queries
- ip addresses
- network resources
- index structure
- decision trees
- privacy preserving
- knn
- normal traffic