-
1
-
-
33745469440
-
-
IANA, "Port numbers," http://www.iana.org/assignments/port- numbers.
-
Port numbers
-
-
-
2
-
-
0344583800
-
Packet-level traffic measurements from the sprint ip backbone
-
C. Fraleigh, S. Moon, B. Lyles, C. Cotton, M. Khan, D. Moll, R. Rockell, T. Seely, and C. Diot, "Packet-level traffic measurements from the sprint ip backbone," IEEE Network, vol. 17, no. 6, pp. 6-16, 2003.
-
(2003)
IEEE Network
, vol.17
, Issue.6
, pp. 6-16
-
-
Fraleigh, C.1
Moon, S.2
Lyles, B.3
Cotton, C.4
Khan, M.5
Moll, D.6
Rockell, R.7
Seely, T.8
Diot, C.9
-
3
-
-
18144414978
-
Is p2p dying or just hiding?
-
Nov
-
T. Karagiannis, A. Broido, N. Brownlee, K. C. Claffy, and M. Faloutsos, "Is p2p dying or just hiding?" in GLOBECOM 2004: Proceedings of IEEE Global Telecommunications Conference, Nov 2004.
-
(2004)
GLOBECOM 2004: Proceedings of IEEE Global Telecommunications Conference
-
-
Karagiannis, T.1
Broido, A.2
Brownlee, N.3
Claffy, K.C.4
Faloutsos, M.5
-
4
-
-
14944339981
-
An analysis of live streaming workloads on the internet
-
K. Sripanidkulchai, B. Maggs, and H. Zhang, "An analysis of live streaming workloads on the internet," in IMC '04: Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, 2004, pp. 41-54.
-
(2004)
IMC '04: Proceedings of the 4th ACM SIGCOMM conference on Internet measurement
, pp. 41-54
-
-
Sripanidkulchai, K.1
Maggs, B.2
Zhang, H.3
-
6
-
-
38349178234
-
Analysis and signature of skype VoIP session traffic
-
Nov/Dec
-
S. Ehlert, S. Petgang, T. Magedanz, and D. Sisalem, "Analysis and signature of skype VoIP session traffic," in CIIT 2006: 4th IASTED International Conference on Communications, Internet, and Information Technology, Nov/Dec 2006, pp. 83-89.
-
(2006)
CIIT 2006: 4th IASTED International Conference on Communications, Internet, and Information Technology
, pp. 83-89
-
-
Ehlert, S.1
Petgang, S.2
Magedanz, T.3
Sisalem, D.4
-
7
-
-
34748819854
-
An experimental study of the skype peer-to-peer VoIP system
-
February
-
S. Guha, N. Daswani, and R. Jain, "An experimental study of the skype peer-to-peer VoIP system," in IPTPS'06: Proceedings of The 5th International Workshop on Peer-to-Peer Systems, February 2006, pp. 1-6.
-
(2006)
IPTPS'06: Proceedings of The 5th International Workshop on Peer-to-Peer Systems
, pp. 1-6
-
-
Guha, S.1
Daswani, N.2
Jain, R.3
-
8
-
-
33847303101
-
Blinc: Multilevel traffic classification in the dark
-
T. Karagiannis, K. Papagiannaki, and M. Faloutsos, "Blinc: multilevel traffic classification in the dark," in SIGCOMM '05: Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications, 2005, pp. 229-240.
-
(2005)
SIGCOMM '05: Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications
, pp. 229-240
-
-
Karagiannis, T.1
Papagiannaki, K.2
Faloutsos, M.3
-
10
-
-
33646890686
-
Traffic classification on the fly
-
L. Bernaille, R. Teixeira, I. Akodkenou, A. Soule, and K. Salamatian, "Traffic classification on the fly," SIGCOMM Comput. Commun. Rev., vol. 36, no. 2, pp. 23-26, 2006.
-
(2006)
SIGCOMM Comput. Commun. Rev
, vol.36
, Issue.2
, pp. 23-26
-
-
Bernaille, L.1
Teixeira, R.2
Akodkenou, I.3
Soule, A.4
Salamatian, K.5
-
11
-
-
34249790654
-
Unexpected means of protocol inference
-
J. Ma, K. Levchenko, C. Kreibich, S. Savage, and G. M. Voelker, "Unexpected means of protocol inference," in IMC '06: Proceedings of the 6th ACM SIGCOMM on Internet measurement, 2006, pp. 313-326.
-
(2006)
IMC '06: Proceedings of the 6th ACM SIGCOMM on Internet measurement
, pp. 313-326
-
-
Ma, J.1
Levchenko, K.2
Kreibich, C.3
Savage, S.4
Voelker, G.M.5
-
12
-
-
0028377540
-
On the self-similar nature of ethernet traffic (extended version)
-
Feb
-
W. E. Leland, M. S. Taqqu, W. Willinger, and D. V. Wilson, "On the self-similar nature of ethernet traffic (extended version)," IEEE /ACM Transactions on Networking, vol. 2, no. 1, pp. 1-15, Feb 1994.
-
(1994)
IEEE /ACM Transactions on Networking
, vol.2
, Issue.1
, pp. 1-15
-
-
Leland, W.E.1
Taqqu, M.S.2
Willinger, W.3
Wilson, D.V.4
-
13
-
-
0031383380
-
Self-similarity in World Wide Web traffic: Evidence and possible causes
-
Dec
-
M. E. Crovella and A. Bestavros, "Self-similarity in World Wide Web traffic: evidence and possible causes," IEEE /ACM Transactions on Networking, vol. 5, no. 6, pp. 835-846, Dec 1997.
-
(1997)
IEEE /ACM Transactions on Networking
, vol.5
, Issue.6
, pp. 835-846
-
-
Crovella, M.E.1
Bestavros, A.2
-
16
-
-
0003557803
-
-
Boston, MA, USA, Tech. Rep
-
C. Cunha, A. Bestavros, and M. Crovella, "Characteristics of www client-based traces," Boston, MA, USA, Tech. Rep., 1995.
-
(1995)
Characteristics of www client-based traces
-
-
Cunha, C.1
Bestavros, A.2
Crovella, M.3
-
19
-
-
0000794470
-
A page-oriented www traffic model for wireless system simulations
-
Jun
-
A. Reyes-Lecuona, E. González-Parada, E. Casilari, J. C. Casasola, and A. D'iaz-Estrella, "A page-oriented www traffic model for wireless system simulations," in ITC: Proceedings of 16th International Teletraffic Congress, Jun 1999, pp. 1271-1280.
-
(1999)
ITC: Proceedings of 16th International Teletraffic Congress
, pp. 1271-1280
-
-
Reyes-Lecuona, A.1
González-Parada, E.2
Casilari, E.3
Casasola, J.C.4
D'iaz-Estrella, A.5
-
21
-
-
18844395404
-
A multi-model approach to the detection of web-based attacks
-
C. Kruegel, G. Vigna, and W. Robertson, "A multi-model approach to the detection of web-based attacks," Computer Networks, vol. 48, no. 5, pp. 717-738, 2005.
-
(2005)
Computer Networks
, vol.48
, Issue.5
, pp. 717-738
-
-
Kruegel, C.1
Vigna, G.2
Robertson, W.3
-
22
-
-
2342633897
-
Measuring normality in http traffic for anomaly-based intrusion detection
-
Jun
-
J. M. Estévez-Tapiador, P. García-Teodoro, and J. E. Díaz-Verdejo, "Measuring normality in http traffic for anomaly-based intrusion detection," Computer Networks, vol. 45, no. 2, pp. 175-193, Jun 2004.
-
(2004)
Computer Networks
, vol.45
, Issue.2
, pp. 175-193
-
-
Estévez-Tapiador, J.M.1
García-Teodoro, P.2
Díaz-Verdejo, J.E.3
-
23
-
-
39049168726
-
Characterizing and detecting relayed traffic: A case study using skype
-
Apr
-
K. Suh, D. R. Figueiredo, J. Kurose, and D. Towsley, "Characterizing and detecting relayed traffic: A case study using skype," in INFOCOM: Proceedings of IEEE INFOCOM'06, Apr 2006.
-
(2006)
INFOCOM: Proceedings of IEEE INFOCOM'06
-
-
Suh, K.1
Figueiredo, D.R.2
Kurose, J.3
Towsley, D.4
-
25
-
-
0003355701
-
Hypertext transfer protocol - HTTP/1.1
-
Jun
-
R. Fielding, J. Gettys, J. Mogul, H. Frystyk, L. Masinter, P. Leach, and T. Berners-Lee, "Hypertext transfer protocol - HTTP/1.1," Internet Request for Comments 2616, Jun 1999.
-
(1999)
Internet Request for Comments
, vol.2616
-
-
Fielding, R.1
Gettys, J.2
Mogul, J.3
Frystyk, H.4
Masinter, L.5
Leach, P.6
Berners-Lee, T.7
-
28
-
-
0035402112
-
Probabilistic techniques for intrusion detection based on computeraudit data
-
Jul
-
N. Ye, X. Li, Q. Chen, S. M. Emran, and M. Xu, "Probabilistic techniques for intrusion detection based on computeraudit data," IEEE Transactions on Systems, Man and Cybernetics, Part A, vol. 31, no. 4, pp. 266-274, Jul 2001.
-
(2001)
IEEE Transactions on Systems, Man and Cybernetics, Part A
, vol.31
, Issue.4
, pp. 266-274
-
-
Ye, N.1
Li, X.2
Chen, Q.3
Emran, S.M.4
Xu, M.5
-
29
-
-
48049114372
-
tcpflow
-
J. Elson, "tcpflow," www.circlemud.org/~jelson/software/ tcpflow/.
-
-
-
Elson, J.1
|