Login / Signup

Generalization of signatures for SSH encrypted traffic identification.

Riyad AlshammariA. Nur Zincir-Heywood
Published in: CICS (2009)
Keyphrases
  • signature recognition
  • traffic flow
  • anomaly detection
  • network traffic
  • traffic control
  • website
  • data sets
  • genetic algorithm
  • response time
  • traffic management
  • traffic information
  • traffic volume
  • stepping stones