Abstract | ||
---|---|---|
Model-based intrusion detection and knowledge discovery are combined to cluster and classify P2P botnet traffic and other malignant network activity by using a self-organizing map (som) self-trained on denied Internet firewall log entries. The SOM analyzed new firewall log entries in a case study to classify similar network activity, and discovered previously unknown local P2P bot traffic and other security issues. |
Year | DOI | Venue |
---|---|---|
2009 | 10.1109/CICYBS.2009.4925099 | Nashville, TN |
Keywords | Field | DocType |
Internet,data mining,peer-to-peer computing,security of data,telecommunication traffic,P2P botnet traffic,denied Internet firewall log entries,knowledge discovery,malignant network traffic,model-based intrusion detection,self-organizing map | Data mining,Firewall (construction),Botnet,Server,Computer network,Self-organizing map,Knowledge extraction,Engineering,Hidden Markov model,Intrusion detection system,The Internet | Conference |
ISBN | Citations | PageRank |
978-1-4244-2769-7 | 7 | 0.50 |
References | Authors | |
13 | 6 |
Name | Order | Citations | PageRank |
---|---|---|---|
Chet Langin | 1 | 30 | 3.53 |
Hongbo Zhou | 2 | 11 | 0.98 |
Shahram Rahimi | 3 | 172 | 40.74 |
B. Gupta | 4 | 152 | 51.48 |
Mehdi R. Zargham | 5 | 29 | 13.55 |
Mohammad R. Sayeh | 6 | 44 | 4.99 |