Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

P2P traffic identification

biblio

Visible to the public A Hybrid Technique To Detect Botnets, Based on P2P Traffic Similarity

Submitted by aekwall on Mon, 04/06/2020 - 10:14am
  • malicious services
  • Scalability
  • Human Factors
  • hypermedia
  • Botnet detection
  • conversation features
  • data flow features
  • DNS query
  • flow counting
  • flow similarity
  • hybrid technique
  • network traffic
  • multiple malicious codes
  • non-P2P traffic filtering mechanism
  • P2P botnet traffic detection
  • P2P traffic identification
  • P2P traffic similarity
  • peer-to-peer botnets
  • phishing links
  • two-stage detection method
  • two-stage traffic classification method
  • peer to peer security
  • feature extraction
  • Computer crime
  • computer network security
  • IP networks
  • telecommunication traffic
  • Protocols
  • invasive software
  • Classification algorithms
  • machine learning algorithms
  • transport protocols
  • network security
  • botnet
  • learning (artificial intelligence)
  • Resiliency
  • pubcrawl
  • Peer-to-peer computing
  • Metrics
  • pattern classification
  • machine learning techniques
  • machine learning classifiers
  • Anomaly Detection

Terms of Use  |  ©2023. CPS-VO