Detecting stealthy P2P botnets using statistical traffic fingerprints.
Junjie ZhangRoberto PerdisciWenke LeeUnum SarfrazXiapu LuoPublished in: DSN (2011)
Keyphrases
- network traffic
- internet traffic
- peer to peer
- ddos attacks
- network management
- overlay network
- peer to peer computing
- statistical information
- traffic flow
- statistical models
- statistical analysis
- road network
- traffic data
- traffic congestion
- lightweight
- traffic management
- fingerprint verification
- distributed network
- scalable distributed
- data driven