Feature analysis of encrypted malicious traffic.
Anish Singh ShekhawatFabio Di TroiaMark StampPublished in: Expert Syst. Appl. (2019)
Keyphrases
- feature analysis
- malicious traffic
- network traffic
- detection mechanism
- traffic patterns
- traffic analysis
- face recognition
- feature extraction
- intrusion detection
- ip addresses
- normal traffic
- anomaly detection
- independent component analysis
- computer networks
- linear discriminant analysis
- pattern classification
- machine learning