메뉴 건너뛰기




Volumn , Issue , 2008, Pages 160-167

Towards automated application signature generation for traffic identification

Author keywords

Application signautre; Automated signature generation; Internet application traffic identification; Traffic measurement and analysis

Indexed keywords

INFORMATION SERVICES; INTERNET; INTERNET PROTOCOLS; LAWS AND LEGISLATION; NETWORK PROTOCOLS; PACKET SWITCHING; UBIQUITOUS COMPUTING;

EID: 51849134180     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/NOMS.2008.4575130     Document Type: Conference Paper
Times cited : (126)

References (17)
  • 1
    • 0141650540 scopus 로고    scopus 로고
    • Analyzing peer-to-peer traffic across large networks
    • Marseilles, France, Nov
    • S. Sen and J. Wang. "Analyzing peer-to-peer traffic across large networks," 2002 ACM SIGCOMM Internet Measurement Workshop, Marseilles, France, Nov. 2002.
    • (2002) 2002 ACM SIGCOMM Internet Measurement Workshop
    • Sen, S.1    Wang, J.2
  • 3
    • 19944406146 scopus 로고    scopus 로고
    • Accurate, Scalable In-Network Identification of P2P Traffic Using Application Signatures
    • Subhabrata Sen, Oliver Spatscheck, Dongmei Wang. "Accurate, Scalable In-Network Identification of P2P Traffic Using Application Signatures," WWW 2004 Conference.
    • WWW 2004 Conference
    • Sen, S.1    Spatscheck, O.2    Wang, D.3
  • 4
    • 85084163246 scopus 로고    scopus 로고
    • Autograph: Toward automated, distributed worm signature detection
    • H. Kim, B. Karp. "Autograph: Toward automated, distributed worm signature detection," 13th Usenix Security Symposium, 2004.
    • (2004) 13th Usenix Security Symposium
    • Kim, H.1    Karp, B.2
  • 6
    • 14844309952 scopus 로고    scopus 로고
    • The EarlyBird System for Real-time Detection of Unknown Worms
    • CS2003-0761, August
    • Sumeet Singh, Cristian Estan, George Varghese and Stefan Savage. "The EarlyBird System for Real-time Detection of Unknown Worms", UCSD Tech Report CS2003-0761, August 2003.
    • (2003) UCSD Tech Report
    • Singh, S.1    Estan, C.2    Varghese, G.3    Savage, S.4
  • 7
    • 51849115537 scopus 로고    scopus 로고
    • Comparison of Three Sliding-Window Based Worm Signature Generation Schemes,
    • Technical Report LU-CSE-05-025
    • W. Scheirer, M. Chuah. "Comparison of Three Sliding-Window Based Worm Signature Generation Schemes," Technical Report LU-CSE-05-025.
    • Scheirer, W.1    Chuah, M.2
  • 9
    • 33947661442 scopus 로고    scopus 로고
    • A Hybrid Approach for Accurate Application Traffic Identification
    • Vancouver, April
    • Young J. Won, Byung-Chul Park, Hong-Taek Ju, Myung-Sup Kim, and James W. Hong. "A Hybrid Approach for Accurate Application Traffic Identification," IEEE/IFIP E2EMON Workshop, Vancouver, April 2006, pp. 1-8.
    • (2006) IEEE/IFIP E2EMON Workshop , pp. 1-8
    • Won, Y.J.1    Park, B.-C.2    Ju, H.-T.3    Kim, M.-S.4    Hong, J.W.5
  • 10
    • 51849123744 scopus 로고    scopus 로고
    • Winpcap. http://www.winpcap.org/.
    • Winpcap
  • 14
    • 27544444280 scopus 로고    scopus 로고
    • Dynamic Taint Analysis: Automatic Detection, Analysis, and Signature Generation of Exploit Attacks on Commodity Software
    • Feb
    • James Newsome and Dawn Song. "Dynamic Taint Analysis: Automatic Detection, Analysis, and Signature Generation of Exploit Attacks on Commodity Software," Network and Distributed Systems Security Symposium, Feb 2005.
    • (2005) Network and Distributed Systems Security Symposium
    • Newsome, J.1    Song, D.2
  • 15
    • 34748815708 scopus 로고    scopus 로고
    • Analysis and Signature of Skype VoIP Session Traffic,
    • NGNI-SKYPE-06b, Berlin, Germany, July
    • Sven Ehlert and Sandrine Petgang, "Analysis and Signature of Skype VoIP Session Traffic," Franunhofer FOKUS Technical Report NGNI-SKYPE-06b, Berlin, Germany, July, 2006.
    • (2006) Franunhofer FOKUS Technical Report
    • Ehlert, S.1    Petgang, S.2
  • 16
    • 38049121051 scopus 로고    scopus 로고
    • Laurent Bernaille and Renata Teixeira, Early Recognition of Encrypted Applications, PAM 2007, Louvain-la-neuve, Belgium, April 5-6, 2007, pp. 165-175.
    • Laurent Bernaille and Renata Teixeira, "Early Recognition of Encrypted Applications," PAM 2007, Louvain-la-neuve, Belgium, April 5-6, 2007, pp. 165-175.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.