On Tactics to Deploy White-Hat Worms in Botnet Defense System.
Taku KageyamaShingo YamaguchiPublished in: GCCE (2021)
Keyphrases
- ddos attacks
- denial of service attacks
- network traffic
- intrusion detection
- ip addresses
- network security
- dos attacks
- intrusion detection system
- peer to peer
- defense mechanisms
- anomaly detection
- computer networks
- computer virus
- data rich
- real time
- computer systems
- social networks
- ip address
- machine learning
- data mining
- advanced research projects agency
- database