A Real-Time System For Abusive Network Traffic Detection

Volume: 9 Number: 2 July 1, 2013
  • Georgios Kakavelakıs
EN TR

A Real-Time System For Abusive Network Traffic Detection

Abstract

Keywords

References

  1. [1] Messaging Anti-Abuse working Group (MAAWG), "Email metrics program: The network's operator perspective," Tech. Rep. 13, November. 2010. Available: http://www.maawg.org/sites/maawg/files/news/MAAWG_2010- Q1Q2_Metrics_Report_13.pdf.
  2. [2] J. Postel. (1981, September). Internet protocol. Internet RFC 791 Available: http://www.faqs.org/rfcs/rfc791.html.
  3. [3] R. Beverly and K. Sollins, "Exploiting transport-level characteristics of spam," in CEAS 2008 - Fifth Conference on Email and Anti-Spam.
  4. [4] X. Zhao, D. Pei, L. Wang, D. Massey and A. Mankin, "An analysis of BGP multiple origin AS (MOAS) conflicts." in Proceedings of the First ACM SIGCOMM Workshop on Internet Measurement (IMW), 2001.
  5. [5] T. Ouyang, S. Ray, M. Allman and M. Rabinovich, "A Large-Scale Empirical Analysis of Email Spam Detection through Transport-level Characteristics," Technical Report 10-001, International Computer Science Institute., January 2010.
  6. [6] Postel. (1981, September). Transmission control protocol. Internet RFC 793 Available: http://www.ietf.org/rfc/rfc793.txt.
  7. [7] A. Ramachandran and N. Feamster, "Understanding the network-level behavior of spammers." in Proceedings of ACM SIGCOMM.
  8. [8] D. Schatzmann, M. Burkhart and T. Spyropoulos, "Inferring spammers in the network core," in Passive and Active Conference, Seoul,South Corea, 2009, pp. 229–238.

Details

Primary Language

Turkish

Subjects

-

Journal Section

-

Authors

Georgios Kakavelakıs This is me

Publication Date

July 1, 2013

Submission Date

September 16, 2015

Acceptance Date

-

Published in Issue

Year 2013 Volume: 9 Number: 2

APA
Kakavelakıs, G. (2013). A Real-Time System For Abusive Network Traffic Detection. Journal of Naval Sciences and Engineering, 9(2), 1-11. https://izlik.org/JA94NT79RH
AMA
1.Kakavelakıs G. A Real-Time System For Abusive Network Traffic Detection. JNSE. 2013;9(2):1-11. https://izlik.org/JA94NT79RH
Chicago
Kakavelakıs, Georgios. 2013. “A Real-Time System For Abusive Network Traffic Detection”. Journal of Naval Sciences and Engineering 9 (2): 1-11. https://izlik.org/JA94NT79RH.
EndNote
Kakavelakıs G (July 1, 2013) A Real-Time System For Abusive Network Traffic Detection. Journal of Naval Sciences and Engineering 9 2 1–11.
IEEE
[1]G. Kakavelakıs, “A Real-Time System For Abusive Network Traffic Detection”, JNSE, vol. 9, no. 2, pp. 1–11, July 2013, [Online]. Available: https://izlik.org/JA94NT79RH
ISNAD
Kakavelakıs, Georgios. “A Real-Time System For Abusive Network Traffic Detection”. Journal of Naval Sciences and Engineering 9/2 (July 1, 2013): 1-11. https://izlik.org/JA94NT79RH.
JAMA
1.Kakavelakıs G. A Real-Time System For Abusive Network Traffic Detection. JNSE. 2013;9:1–11.
MLA
Kakavelakıs, Georgios. “A Real-Time System For Abusive Network Traffic Detection”. Journal of Naval Sciences and Engineering, vol. 9, no. 2, July 2013, pp. 1-11, https://izlik.org/JA94NT79RH.
Vancouver
1.Georgios Kakavelakıs. A Real-Time System For Abusive Network Traffic Detection. JNSE [Internet]. 2013 Jul. 1;9(2):1-11. Available from: https://izlik.org/JA94NT79RH