Network Attack Traffic Detection for Calculating Correlation of the Flow.
Jee-Tae ParkYoung-Hoon GooKyu-Seok ShimUi-Jun BaekMyung-Sup KimPublished in: ICTC (2018)
Keyphrases
- normal traffic
- network traffic
- origin destination
- ddos attacks
- network attacks
- denial of service attacks
- anomaly detection
- traffic analysis
- internet traffic
- dos attacks
- worm detection
- transportation networks
- intrusion detection system
- traffic load
- ip address
- malicious traffic
- mesh network
- network traffic monitoring
- detection algorithm
- network structure
- computer networks
- telecommunication networks
- wireless sensor networks
- intrusion detection
- attack graphs
- false alarms
- traffic patterns
- network resources
- atm networks
- countermeasures
- network security
- detect anomalies
- resource utilization
- detection mechanism
- ip addresses
- travel time
- differentiated services
- denial of service
- internet service providers
- communication networks
- network layer
- traffic data