A novel approach to detect extraneous network traffic from the compromised router | IEEE Conference Publication | IEEE Xplore