Estimation of Behavior of Scanners Based on ISDAS Distributed Sensors
Given independent multiple access logs, we develop a mathematical model to identify the number of malicious hosts in the current Internet. In our model, the number of malicious hosts is formalized as a function taking two inputs, namely the duration of ob
- PDF / 24,976,393 Bytes
 - 699 Pages / 430.15 x 660.926 pts Page_size
 - 63 Downloads / 216 Views