P2P network classification

作者: Patrick Molijn

DOI:

关键词:

摘要:

参考文章(42)
Saman Shojae Chaeikar, Hossein Rouhani Zeidanloo, Azizah Abdul Manaf, Mazdak Zamani, Rabiah Ahmad, A proposed framework for P2P botnet detection International Association of Computer Science and Information Technology Press. ,(2010)
Irfan Ul Haq, Sardar Ali, Hassan Khan, Syed Ali Khayam, None, What is the impact of p2p traffic on anomaly detection recent advances in intrusion detection. pp. 1- 17 ,(2010) , 10.1007/978-3-642-15512-3_1
A. Madhukar, C. Williamson, A Longitudinal Study of P2P Traffic Classification modeling, analysis, and simulation on computer and telecommunication systems. pp. 179- 188 ,(2006) , 10.1109/MASCOTS.2006.6
Andrew W. Moore, Konstantina Papagiannaki, Toward the Accurate Identification of Network Applications Lecture Notes in Computer Science. pp. 41- 54 ,(2005) , 10.1007/978-3-540-31966-5_4
Sumeet Dua, Xian Du, None, Data Mining and Machine Learning in Cybersecurity Auerbach Publications. ,(2011) , 10.1201/B10867
Mehedy Masud, Latifur Khan, Bhavani Thuraisingham, Data Mining Tools for Malware Detection ,(2011)
Mark A. Hall, Ian H. Witten, Eibe Frank, Data Mining: Practical Machine Learning Tools and Techniques ,(1999)
Roberto Perdisci, Guofei Gu, Wenke Lee, Junjie Zhang, BotMiner: clustering analysis of network traffic for protocol- and structure-independent botnet detection usenix security symposium. pp. 139- 154 ,(2008)
Jim Binkley, Craig Schiller, Botnets: The Killer Web Applications ,(2007)
Gary McGraw, Greg Morrisett, Attacking Malicious Code: A Report to the Infosec Research Council IEEE Software. ,vol. 17, pp. 33- 41 ,(2000) , 10.1109/52.877857