Data Stolen Trojan Detection based on Network Behaviors.
Yiguo PuXiaojun ChenXu CuiJinqiao ShiLi GuoCheng QiPublished in: ITQM (2013)
Keyphrases
- data sets
- data processing
- data analysis
- network structure
- raw data
- synthetic data
- data collection
- statistical analysis
- data transfer
- computer systems
- probability distribution
- high quality
- training data
- data sources
- prior knowledge
- original data
- central server
- activity patterns
- network bandwidth
- false alarms
- human behavior
- communication networks
- data quality
- input data
- anomaly detection
- database
- knowledge discovery