作者: Jiyong Jang , Jialong Zhang , Ting Wang , Xin Hu
DOI:
关键词: Server 、 Computer network 、 Graph 、 Bipartite graph 、 Distributed computing 、 Computer science
摘要: Identifying malicious servers is provided. Malicious edges between server vertices corresponding to visible and invisible involved in network traffic redirection chains are determined based on graph-based features within a bipartite graph the distance-based chains. identified Access by client devices blocked graph.