-
1
-
-
33745469440
-
-
IANA, "Port numbers," http://www.iana.org/assignments/port- numbers.
-
Port numbers
-
-
-
2
-
-
33847303101
-
Blinc: Multilevel traffic classification in the dark
-
T. Karagiannis, K. Papagiannaki, and M. Faloutsos, "Blinc: multilevel traffic classification in the dark," in SIGCOMM'05: Proceedings of the 2005 ACM conference on Applications, technologies, architectures, and protocols for computer communications, 2005, pp. 229-240.
-
(2005)
SIGCOMM'05: Proceedings of the 2005 ACM conference on Applications, technologies, architectures, and protocols for computer communications
, pp. 229-240
-
-
Karagiannis, T.1
Papagiannaki, K.2
Faloutsos, M.3
-
3
-
-
14944345677
-
Transport layer identification of P2P traffic
-
T. Karagiannis, A. Broido, M. Faloutsos, and K. claffy, "Transport layer identification of P2P traffic," in IMC '04: Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, 2004, pp. 121-134.
-
(2004)
IMC '04: Proceedings of the 4th ACM SIGCOMM conference on Internet measurement
, pp. 121-134
-
-
Karagiannis, T.1
Broido, A.2
Faloutsos, M.3
claffy, K.4
-
4
-
-
14944339981
-
An analysis of live streaming workloads on the internet
-
K. Sripanidkulchai, B. Maggs, and H. Zhang, "An analysis of live streaming workloads on the internet," in IMC '04: Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, 2004, pp. 41-54.
-
(2004)
IMC '04: Proceedings of the 4th ACM SIGCOMM conference on Internet measurement
, pp. 41-54
-
-
Sripanidkulchai, K.1
Maggs, B.2
Zhang, H.3
-
6
-
-
36949009834
-
Revealing skype traffic: When randomness plays with you
-
Aug
-
D. Bonfiglio, M. Mellia, M. Meo, D. Rossi, and P. Tofanelli, "Revealing skype traffic: When randomness plays with you," in SIGCOMM'07: Proceedings of the 2007 ACM SIGCOMM, Aug 2007.
-
(2007)
SIGCOMM'07: Proceedings of the 2007 ACM SIGCOMM
-
-
Bonfiglio, D.1
Mellia, M.2
Meo, M.3
Rossi, D.4
Tofanelli, P.5
-
8
-
-
14944367267
-
Characterization of network-wide anomalies in traffic flows
-
A. Lakhina, M. Crovella, and C. Diot, "Characterization of network-wide anomalies in traffic flows," in IMC '04: Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, 2004, pp. 201-206.
-
(2004)
IMC '04: Proceedings of the 4th ACM SIGCOMM conference on Internet measurement
, pp. 201-206
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
9
-
-
33847290520
-
Mining anomalies using traffic feature distributions
-
_, "Mining anomalies using traffic feature distributions," in SIGCOMM' 05: Proceedings of the 2005 ACM conference on Applications, technologies, architectures, and protocols for computer communications, 2005, pp. 217-228.
-
(2005)
SIGCOMM' 05: Proceedings of the 2005 ACM conference on Applications, technologies, architectures, and protocols for computer communications
, pp. 217-228
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
14
-
-
33646890686
-
Traffic classification on the fly
-
L. Bernaille, R. Teixeira, I. Akodkenou, A. Soule, and K. Salamatian, "Traffic classification on the fly," ACM SIGCOMM Comput. Commun. Rev., vol. 36, no. 2, pp. 23-26, 2006.
-
(2006)
ACM SIGCOMM Comput. Commun. Rev
, vol.36
, Issue.2
, pp. 23-26
-
-
Bernaille, L.1
Teixeira, R.2
Akodkenou, I.3
Soule, A.4
Salamatian, K.5
-
15
-
-
34249790654
-
Unexpected means of protocol inference
-
J. Ma, K. Levchenko, C. Kreibich, S. Savage, and G. M. Voelker, "Unexpected means of protocol inference," in IMC '06: Proceedings of the 6th ACM SIGCOMM Internet Measurement Conference, 2006, pp. 313-326.
-
(2006)
IMC '06: Proceedings of the 6th ACM SIGCOMM Internet Measurement Conference
, pp. 313-326
-
-
Ma, J.1
Levchenko, K.2
Kreibich, C.3
Savage, S.4
Voelker, G.M.5
-
16
-
-
33947661442
-
A hybrid approach for accurate application traffic identification
-
Apr
-
Y. J. Won, B.-C. Park, H.-T. Ju, M.-S. Kim, and J. W. Hong, "A hybrid approach for accurate application traffic identification," in 4th IEEE/IFIP Workshop on End-to-End Monitoring Techniques and Services, Apr 2006, pp. 1-8.
-
(2006)
4th IEEE/IFIP Workshop on End-to-End Monitoring Techniques and Services
, pp. 1-8
-
-
Won, Y.J.1
Park, B.-C.2
Ju, H.-T.3
Kim, M.-S.4
Hong, J.W.5
-
18
-
-
34748819854
-
An experimental study of the skype peer-to-peer VoIP system
-
February
-
S. Guha, N. Daswani, and R. Jain, "An experimental study of the skype peer-to-peer VoIP system," in IPTPS'06: Proceedings of the 5th International Workshop on Peer-to-Peer Systems, February 2006, pp. 1-6.
-
(2006)
IPTPS'06: Proceedings of the 5th International Workshop on Peer-to-Peer Systems
, pp. 1-6
-
-
Guha, S.1
Daswani, N.2
Jain, R.3
-
19
-
-
39049168726
-
Characterizing and detecting relayed traffic: A case study using skype
-
Apr
-
K. Suh, D. R. Figueiredo, J. Kurose, and D. Towsley, "Characterizing and detecting relayed traffic: A case study using skype," in INFOCOM' 06: Proceedings of the 25th IEEE International Conference on Computer Communications, Apr 2006.
-
(2006)
INFOCOM' 06: Proceedings of the 25th IEEE International Conference on Computer Communications
-
-
Suh, K.1
Figueiredo, D.R.2
Kurose, J.3
Towsley, D.4
-
20
-
-
38349178234
-
Analysis and signature of skype VoIP session traffic
-
Nov/Dec
-
S. Ehlert, S. Petgang, T. Magedanz, and D. Sisalem, "Analysis and signature of skype VoIP session traffic," in CIIT 2006: 4th IASTED International Conference on Communications, Internet, and Information Technology, Nov/Dec 2006, pp. 83-89.
-
(2006)
CIIT 2006: 4th IASTED International Conference on Communications, Internet, and Information Technology
, pp. 83-89
-
-
Ehlert, S.1
Petgang, S.2
Magedanz, T.3
Sisalem, D.4
-
21
-
-
0035271352
-
An anomaly detection technique based on a chi-square statistic for detecting intrusions into information systems
-
N. Ye and Q. Chen, "An anomaly detection technique based on a chi-square statistic for detecting intrusions into information systems," Quality and Reliability Engineering International, vol. 17, no. 2, pp. 105-112, 2001.
-
(2001)
Quality and Reliability Engineering International
, vol.17
, Issue.2
, pp. 105-112
-
-
Ye, N.1
Chen, Q.2
-
22
-
-
2342633897
-
Measuring normality in http traffic for anomaly-based intrusion detection
-
Jun
-
J. M. Estévez-Tapiador, P. García-Teodoro, and J. E. Díaz-Verdejo, "Measuring normality in http traffic for anomaly-based intrusion detection," Computer Networks, vol. 45, no. 2, pp. 175-193, Jun 2004.
-
(2004)
Computer Networks
, vol.45
, Issue.2
, pp. 175-193
-
-
Estévez-Tapiador, J.M.1
García-Teodoro, P.2
Díaz-Verdejo, J.E.3
-
23
-
-
0001454867
-
On the criterion that a given system of deviations from the probable in the case of a correlated system of variables is such that it can be reasonably supposed to have arisen from random sampling
-
50, pp
-
K. Pearson, "On the criterion that a given system of deviations from the probable in the case of a correlated system of variables is such that it can be reasonably supposed to have arisen from random sampling," Philos. Mag. Series 5, vol. 50, pp. 157-172, 1900.
-
(1900)
Philos. Mag. Series
, vol.5
, pp. 157-172
-
-
Pearson, K.1
-
25
-
-
33745773302
-
Tracking anonymous peer-to-peer VoIP calls on the internet
-
X. Wang, S. Chen, and S. Jajodia, "Tracking anonymous peer-to-peer VoIP calls on the internet," in CCS'05: Proceedings of the 12th ACM conference on Computer and communications security, 2005, pp. 81-91.
-
(2005)
CCS'05: Proceedings of the 12th ACM conference on Computer and communications security
, pp. 81-91
-
-
Wang, X.1
Chen, S.2
Jajodia, S.3
-
27
-
-
48049114372
-
tcpflow
-
J. Elson, "tcpflow," http://www.circlemud.org/~jelson/software/ tcpflow/.
-
-
-
Elson, J.1
|