Detection and utilization of new-type encrypted network traffic in distributed scenarios.
Ping ZhangFeng ChenHongyuan YuePublished in: Eng. Appl. Artif. Intell. (2024)
Keyphrases
- network traffic
- anomaly detection
- computer networks
- detecting anomalous
- normal traffic
- intrusion detection
- intrusion detection system
- distributed environment
- network security
- detect anomalies
- network management
- distributed systems
- network monitoring
- network intrusion detection
- detection algorithm
- peer to peer
- traffic analysis
- internet traffic
- network bandwidth
- traffic data
- traffic volume
- false alarms
- network resources
- peer to peer networks
- network traffic data
- worm detection
- malicious traffic
- databases
- unsupervised learning
- text classification
- real world