메뉴 건너뛰기




Volumn 2, Issue , 2009, Pages 104-109

AutoSig-automatically generating signatures for applications

Author keywords

Network management; Signature generation; Traffic classiffication

Indexed keywords

APPLICATION PROTOCOLS; APPLICATION SIGNATURES; AUTOMATIC APPLICATION; NETWORK AREA; NETWORK TRAFFIC; PORT NUMBERS; SIGNATURE GENERATION; SUB-STRINGS; SUBSTRING; TRAFFIC TRACES;

EID: 73549107668     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CIT.2009.97     Document Type: Conference Paper
Times cited : (46)

References (15)
  • 1
    • 73549110181 scopus 로고    scopus 로고
    • A. McGregor, M. Hall, P. Lorier, and J. Brunskill. Flow Clustering Using Machine Learning Techniques. In PAM, 2004.
    • A. McGregor, M. Hall, P. Lorier, and J. Brunskill. Flow Clustering Using Machine Learning Techniques. In PAM, 2004.
  • 2
    • 50949098638 scopus 로고    scopus 로고
    • Internet Traffic Identification using Machine Learning
    • San Francisco, USA, November
    • J. Erman, A. Mahanti, and M. Arlitt. 'Internet Traffic Identification using Machine Learning,' Proc. of IEEE Globecom, San Francisco, USA, November 2006.
    • (2006) Proc. of IEEE Globecom
    • Erman, J.1    Mahanti, A.2    Arlitt, M.3
  • 3
    • 14344265818 scopus 로고    scopus 로고
    • Internet Traffic Classification Using Bayesian Analysis Techniques
    • A. W. Moore and D. Zuev. Internet Traffic Classification Using Bayesian Analysis Techniques. In ACM SIGMETRICS, 2005.
    • (2005) ACM SIGMETRICS
    • Moore, A.W.1    Zuev, D.2
  • 4
    • 33846116353 scopus 로고    scopus 로고
    • Traffic Classification using a Statistical Approach
    • Boston, U.S.A, March/April
    • D. Zuev, A. Moore, 'Traffic Classification using a Statistical Approach', Passive & Active Measurement Workshop, Boston, U.S.A, March/April 2005.
    • (2005) Passive & Active Measurement Workshop
    • Zuev, D.1    Moore, A.2
  • 5
    • 33750283653 scopus 로고    scopus 로고
    • A Preliminary Performance Comparison of Five Machine Learning Algorithms for Practical IP Traffic Flow Classification
    • N. Williams, S. Zander, and G. Armitage, 'A Preliminary Performance Comparison of Five Machine Learning Algorithms for Practical IP Traffic Flow Classification,' SIGCOMM Computer Communications Review, Vol. 36, No. 5, pp. 5-16, 2006.
    • (2006) SIGCOMM Computer Communications Review , vol.36 , Issue.5 , pp. 5-16
    • Williams, N.1    Zander, S.2    Armitage, G.3
  • 8
    • 24344475810 scopus 로고    scopus 로고
    • Accurate, Scalable In-Network Identification of P2P Traffic Using Application Signatures
    • S. Sen O. Spatscheck and D. Wang, 'Accurate, Scalable In-Network Identification of P2P Traffic Using Application Signatures,' Proc. of ACM WWW'04, 2004.
    • (2004) Proc. of ACM WWW'04
    • Sen, S.1    Spatscheck, O.2    Wang, D.3
  • 9
    • 43249095873 scopus 로고    scopus 로고
    • A Survey of String Matching Approaches in Hardware
    • 06-01, University of California, Irvine, March
    • S. Fide and S. Jenks, "A Survey of String Matching Approaches in Hardware", Technical Report TR SPDS 06-01, University of California - Irvine, March 2006
    • (2006) Technical Report TR SPDS
    • Fide, S.1    Jenks, S.2
  • 12
    • 84991765629 scopus 로고    scopus 로고
    • S. Singh, C. Estan, G. Varghese, and S. Savage, 2004. Automated worm fingerprinting. In Proceedings of the 6th Conference on Symposium on Opearting Systems Design & Implementation - 6, OSDI 04.
    • S. Singh, C. Estan, G. Varghese, and S. Savage, 2004. Automated worm fingerprinting. In Proceedings of the 6th Conference on Symposium on Opearting Systems Design & Implementation - Volume 6, OSDI 04.
  • 13
    • 85084163246 scopus 로고    scopus 로고
    • Autograph: Toward automatic distributed worm signature detection
    • H. Kim, B. Karp, Autograph: Toward automatic distributed worm signature detection. In: Proc. of the USENIX Security Symp. Diego, 2004. pp.271-286
    • (2004) Proc. of the USENIX Security Symp. Diego , pp. 271-286
    • Kim, H.1    Karp, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.