Can we beat legitimate cyber behavior mimicking attacks from botnets?
Contribuinte(s) |
[Unknown] |
---|---|
Data(s) |
01/01/2012
|
Identificador | |
Idioma(s) |
eng |
Publicador |
IEEE Computer Society |
Relação |
http://dro.deakin.edu.au/eserv/DU:30049218/yu-canwebeat-2012.pdf http://dro.deakin.edu.au/eserv/DU:30049218/yu-canwebeat-evid1-2012.pdf http://dro.deakin.edu.au/eserv/DU:30049218/yu-canwebeat-evid2-2012.pdf http://doi.org/10.1109/INFCOM.2012.6195714 |
Direitos |
2012, IEEE |
Palavras-Chave | #botnet #detection #flash crowd attack #mimicking attack |
Tipo |
Conference Paper |