Unwanted traffic identification in large-scale university networks: A case study

0Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

To mitigate the malicious impact of P2P traffic on University networks, in this article the authors have proposed the design of payload-oblivious privacy-preserving P2P traffic detectors. The proposed detectors do not rely on payload signatures, and hence, are resilient to P2P client and protocol changes-a phenomenon which is now becoming increasingly frequent with newer, more popular P2P clients/protocols. The article also discusses newer designs to accurately distinguish P2P botnets from benign P2P applications. The datasets gathered from the testbed and other sources range from Gigabytes to Terabytes containing both unstructured and structured data assimilated through running of various applications within the University network. The approaches proposed in this article describe novel ways to handle large amounts of data that is collected at unprecedented scale in authors’ University network.

Cite

CITATION STYLE

APA

Hota, C., Narang, P., & Reddy, J. M. (2016). Unwanted traffic identification in large-scale university networks: A case study. In Big Data Analytics: Methods and Applications (pp. 163–187). Springer India. https://doi.org/10.1007/978-81-322-3628-3_9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free