Identifying and Investigating Intrusive Scanning Patterns by Visualizing Network Telescope Traffic in a 3-D Scatter-plot.
Jean-Pierre van RielBarry IrwinPublished in: ISSA (2006)
Keyphrases
- network traffic
- traffic patterns
- origin destination
- internet traffic
- network model
- traffic flows
- network traffic data
- network resources
- traffic analysis
- traffic flow
- traffic data
- transportation networks
- computer networks
- traffic network
- resource utilization
- network structure
- high speed networks
- network traffic monitoring
- traffic engineering
- traffic load
- atm networks
- ip address
- traffic volume
- wireless sensor networks
- real time
- dos attacks
- telecommunication networks
- communication networks
- link failure
- mesh network
- peer to peer
- data mining techniques
- intrusion detection
- network configuration
- travel time
- network layer
- movement patterns
- traffic conditions
- ip addresses
- input patterns
- network conditions