Login / Signup
On Inferring Application Protocol Behaviors in Encrypted Network Traffic.
Charles V. Wright
Fabian Monrose
Gerald M. Masson
Published in:
J. Mach. Learn. Res. (2006)
Keyphrases
</>
network traffic
intrusion detection
network intrusion detection
anomaly detection
computer networks
network security
covert channel
detecting anomalous
network bandwidth
network monitoring
real world
data mining
intrusion detection system
routing algorithm
internet traffic
network traffic data