Login / Signup
Detecting encrypted botnet traffic.
Han Zhang
Christos Papadopoulos
Daniel Massey
Published in:
INFOCOM (2013)
Keyphrases
</>
network traffic
ddos attacks
denial of service attacks
traffic data
real time
traffic flow
stepping stones
traffic analysis
peer to peer
automatic detection
traffic control
traffic volume
intrusion detection
dos attacks
congestion control
control system
encryption key
data mining