Computer Science ›› 2006, Vol. 33 ›› Issue (9): 76-80.

Previous Articles     Next Articles

  

  • Online:2018-11-17 Published:2018-11-17

Abstract: DDOS, worm and mass mailing have a significant growth recent years, which has endangered Internet security. Most attack like worm has the nature of aggressive, greedy and behavior pattern of self-similar. This paper proposed an attack behavior analysis ba

Key words: Massive malicious activity, Frequent pattern mining, 2-page hash table algorithm

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!