Estimation of Behavior of Scanners Based on ISDAS Distributed Sensors
Given independent multiple access logs, we develop a mathematical model to identify the number of malicious hosts in the current Internet. In our model, the number of malicious hosts is formalized as a function taking two inputs, namely the duration of ob
- PDF / 24,976,393 Bytes
- 699 Pages / 430.15 x 660.926 pts Page_size
- 63 Downloads / 192 Views