DSpace logo

Please use this identifier to cite or link to this item: http://dspace.bits-pilani.ac.in:8080/jspui/xmlui/handle/123456789/8381
Full metadata record
DC FieldValueLanguage
dc.contributor.authorNarang, Pratik-
dc.date.accessioned2023-01-09T04:24:05Z-
dc.date.available2023-01-09T04:24:05Z-
dc.date.issued2016-
dc.identifier.urihttps://www.springerprofessional.de/en/unwanted-traffic-identification-in-large-scale-university-networ/10866078-
dc.identifier.urihttp://dspace.bits-pilani.ac.in:8080/xmlui/handle/123456789/8381-
dc.description.abstractTo mitigate the malicious impact of P2P traffic on University networks, in this article the authors have proposed the design of payload-oblivious privacy-preserving P2P traffic detectors. The proposed detectors do not rely on payload signatures, and hence, are resilient to P2P client and protocol changes—a phenomenon which is now becoming increasingly frequent with newer, more popular P2P clients/protocols. The article also discusses newer designs to accurately distinguish P2P botnets from benign P2P applications. The datasets gathered from the testbed and other sources range from Gigabytes to Terabytes containing both unstructured and structured data assimilated through running of various applications within the University network. The approaches proposed in this article describe novel ways to handle large amounts of data that is collected at unprecedented scale in authors’ University network.en_US
dc.language.isoenen_US
dc.publisherSpringeren_US
dc.subjectComputer Scienceen_US
dc.subjectBig Dataen_US
dc.subjectUniversity Networksen_US
dc.titleUnwanted Traffic Identification in Large-Scale University Networks: A Case Studyen_US
dc.typeBook chapteren_US
Appears in Collections:Department of Computer Science and Information Systems

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.