Can encrypted traffic be identified without port numbers, IP addresses and payload inspection?
Riyad AlshammariA. Nur Zincir-HeywoodPublished in: Comput. Networks (2011)
Keyphrases
- ip addresses
- network traffic
- stepping stones
- ip address
- traffic analysis
- enterprise network
- normal traffic
- address space
- intrusion detection
- ddos attacks
- end hosts
- internet traffic
- network security
- ip traffic
- computer networks
- bloom filter
- network devices
- anomaly detection
- campus network
- auto configuration
- network management
- internet protocol
- information systems
- dos attacks
- learning algorithm
- ip networks
- routing algorithm
- multi dimensional