Back to Results
First PageMeta Content
Computer network security / Multi-agent systems / Spamming / File sharing networks / Deep packet inspection / Botnet / Peer-to-peer / ANts P2P / Storm botnet / Computing / Concurrent computing / Distributed computing


2014 IEEE Security and Privacy Workshops PeerShark: Detecting Peer-to-Peer Botnets by Tracking Conversations Pratik Narang, Subhajit Ray, Chittaranjan Hota
Add to Reading List

Document Date: 2014-04-30 03:11:19


Open Document

File Size: 583,61 KB

Share Result on Facebook

City

Denver / San Francisco / Brisbane / New Delhi / Cambridge / /

Company

Distributed Computing Systems / BitTorrent / PacketGroup / Intrusion Detection Systems / Skype / ConversationGroup / Global Telecommunications / Bayesian Networks / P acketGroup / /

Continent

Americas / /

Country

India / /

/

Event

Person Communication and Meetings / /

Facility

University of Georgia / Hyderabad Campus / Information Systems Birla Institute of Technology / M. Hall / Computer Science University of Illinois at Chicago Chicago / University of Amsterdam / University of New Brunswick / /

IndustryTerm

backbone router / resources/internet-studies / overlay networks / machine learning algorithms / Internet backbone / Internet traffic classification / Internet Relay Chat / Internet measurement / system or a network / malicious software / weka data mining software / internet study / layer protocol / internet phenomena / Internet traffic / botnets/applications / anomalous network / bot communications / mining / detection algorithm / content distribution technologies / regular web traffic / botnet applications / /

OperatingSystem

DoS / /

Organization

University of Georgia / Chittaranjan Hota Venkat Venkatakrishnan Department of Computer Science / University of Illinois at Chicago / University of New Brunswick / University of Amsterdam / US Federal Reserve / Department of Information Technology / Birla Institute of Technology and Science / /

Person

Babak Rahbarinia / Morgan Kaufmann / Pratik Narang / K. Levchenko / V / /

Position

distributed model for data collection / network administrator / assistant to network administrators / /

Product

AdaBoost / /

ProgrammingLanguage

C / /

ProvinceOrState

New Brunswick / Georgia / /

PublishedMedium

Machine Learning / Lecture Notes in Computer Science / /

Technology

LAN / three algorithms / machine learning algorithms / backbone router / use encryption / Peer-to-Peer / Information Technology / P2P / machine learning / Lua / UDP / content distribution technologies / encryption / Transport layer protocol / decentralized protocol / data mining / IPv4 / end procedure Algorithm / Voice-over-IP / detection algorithm / /

URL

http /

SocialTag