-
1
-
-
20444441611
-
HMM profiles for network traffic classification
-
Wright C., Monrose F., Masson G. M., "HMM Profiles for Network Traffic Classification", Proceedings of the ACM DMSEC, pp 9-15, 2004.
-
(2004)
Proceedings of the ACM DMSEC
, pp. 9-15
-
-
Wright, C.1
Monrose, F.2
Masson, G.M.3
-
2
-
-
29244451861
-
ACAS: Automated construction of application signatures
-
Haffner P., Sen S., Spatscheck O., Wang D., "ACAS: Automated Construction of Application Signatures", Proceedings of the ACM SIGCOMM, pp.197-202, 2005.
-
(2005)
Proceedings of the ACM SIGCOMM
, pp. 197-202
-
-
Haffner, P.1
Sen, S.2
Spatscheck, O.3
Wang, D.4
-
3
-
-
14344265818
-
Internet traffic classification using bayesian analysis techniques
-
Moore A. W., Zuev D., "Internet Traffic Classification Using Bayesian Analysis Techniques", Proceedings of the ACM SIGMETRICS, pp 50-60, 2005.
-
(2005)
Proceedings of the ACM SIGMETRICS
, pp. 50-60
-
-
Moore, A.W.1
Zuev, D.2
-
5
-
-
33750283653
-
A prelimenary performance comparison of five machine learning algorithms for practical ip traffic flow comparison
-
Williams N., Zander S., Armitage G., "A Prelimenary Performance Comparison of Five Machine Learning Algorithms for Practical IP Traffic Flow Comparison", ACM SIGCOMM Computer Communication Review, Vol. 36, No. 5, pp. 5-16, 2006.
-
(2006)
ACM SIGCOMM Computer Communication Review
, vol.36
, Issue.5
, pp. 5-16
-
-
Williams, N.1
Zander, S.2
Armitage, G.3
-
7
-
-
85077692116
-
Dynamic application layer protocol analysis for network intrusion detection
-
Dreger H., Feldmann A., Mai M., Paxson V., Sommer R., "Dynamic application layer protocol analysis for network intrusion detection", Proceedings of the 15th USENIX Security Symposium, pp. 257-272, 2006.
-
(2006)
Proceedings of the 15th USENIX Security Symposium
, pp. 257-272
-
-
Dreger, H.1
Feldmann, A.2
Mai, M.3
Paxson, V.4
Sommer, R.5
-
8
-
-
84944746481
-
Behavioral authentication of server flows
-
Early J., Brodley C., Rosenberg C., "Behavioral authentication of server flows", Proceedings of the 19th Annual Computer Security Applications Conference, pp. 46-55, 2003.
-
(2003)
Proceedings of the 19th Annual Computer Security Applications Conference
, pp. 46-55
-
-
Early, J.1
Brodley, C.2
Rosenberg, C.3
-
9
-
-
33847303101
-
BLINC: Multilevel traffic classification in the dark
-
Karagiannis, T., Papagiannaki, K., and Faloutsos, M, "BLINC: Multilevel Traffic Classification in the Dark", Proceedings of Applications, Technologies, Architectures, and Protocols For Computer Communications pp 229-240, 2005.
-
(2005)
Proceedings of Applications, Technologies, Architectures, and Protocols for Computer Communications
, pp. 229-240
-
-
Karagiannis, T.1
Papagiannaki, K.2
Faloutsos, M.3
-
10
-
-
33845735523
-
On inferring application protocol behaviors in encrypted network traffic
-
Wright C. V., Monrose F., Masson G. M., "On Inferring Application Protocol Behaviors in Encrypted Network Traffic", Journal of Machine Learning Research, (7), pp. 2745-2769, 2006.
-
(2006)
Journal of Machine Learning Research
, vol.7
, pp. 2745-2769
-
-
Wright, C.V.1
Monrose, F.2
Masson, G.M.3
-
11
-
-
57849161672
-
Early recognition of encrypted applications
-
Louvainla-neuve, Belgium, April
-
Bernaille L., Teixeira R., "Early Recognition of Encrypted Applications", Passive and Active Measurement Conference (PAM), Louvainla-neuve, Belgium, April, 2007.
-
(2007)
Passive and Active Measurement Conference (PAM)
-
-
Bernaille, L.1
Teixeira, R.2
-
12
-
-
40949118103
-
A flow based approach for SSH traffic detection
-
7-10 Oct
-
Alshammari, Riyad; Nurzincir-Heywood, A., "A flow based approach for SSH traffic detection, " Systems, Man and Cybernetics, 2007. ISIC. IEEE International Conference on, vol., no., pp.296-301, 7-10 Oct, 2007.
-
(2007)
Systems, Man and Cybernetics, 2007. ISIC. IEEE International Conference on
, pp. 296-301
-
-
Alshammari, R.1
Nurzincir-Heywood, A.2
-
13
-
-
77950591051
-
-
NLANR, http://pma.nlanr.net/Special.
-
NLANR
-
-
-
14
-
-
77950557595
-
-
MAWI, http://tracer.csl.sony.co.jp/MAWI/.
-
MAWI
-
-
-
15
-
-
0003993827
-
-
last accessed Jan. 2008
-
1999 DARPA intrusion detection evaluation data, http://www.ll.mit.edu/ IST/ideval/docs/1999schedule.html last accessed Jan. 2008.
-
(1999)
DARPA Intrusion Detection Evaluation Data
-
-
-
17
-
-
34248358287
-
Traffic classification using clustering algorithms
-
Erman J., Arlitt M., Mahanti A., "Traffic Classification using Clustering Algorithms", Proceedings of the ACM SIGCOMM, pp. 281-286, 2006.
-
(2006)
Proceedings of the ACM SIGCOMM
, pp. 281-286
-
-
Erman, J.1
Arlitt, M.2
Mahanti, A.3
-
18
-
-
84872200387
-
-
PacketShaper, http://www.packeteer.com/products/packetshaper/.
-
PacketShaper
-
-
-
19
-
-
77950551765
-
-
l7-filter, http://l7-filter.sourceforge.net/.
-
L7-filter
-
-
-
20
-
-
77950550836
-
-
NetMate, http://www.ip-measurement.org/tools/netmate/.
-
NetMate
-
-
-
21
-
-
77950573126
-
-
IETF, http://www3.ietf.org/proceedings/97apr/97apr-final/xrtftr70.htm.
-
IETF
-
-
-
22
-
-
27144489164
-
A tutorial on support vector machines for pattern recognition
-
Burges C. J. C., "A Tutorial on Support Vector Machines for Pattern Recognition", Data Mining and Knowledge Discovery, 2(2): 1-47, 1998.
-
(1998)
Data Mining and Knowledge Discovery
, vol.2
, Issue.2
, pp. 1-47
-
-
Burges, C.J.C.1
-
28
-
-
84876764406
-
-
WEKA Software, http://www.cs.waikato.ac.nz/ml/weka/.
-
WEKA Software
-
-
-
29
-
-
67650075157
-
Investigating two different approaches for encrypted traffic classification
-
vol. no., 1-3 Oct.
-
Alshammari, Riyad; Zincir-Heywood, A. Nur, "Investigating Two Different Approaches for Encrypted Traffic Classification, " Privacy, Security and Trust, 2008. PST '08. Sixth Annual Conference on, vol., no., pp.156-166, 1-3 Oct. 2008.
-
(2008)
Privacy, Security and Trust, 2008. PST '08. Sixth Annual Conference on
, pp. 156-166
-
-
Alshammari, R.1
Zincir-Heywood, A.N.2
-
31
-
-
39049168726
-
Characterizing and detecting relayed traffic: A case study using skype
-
Apr
-
K Suh, D. R. Figueiredo, J. Kurose, and D. Towsley, "Characterizing and detecting relayed traffic: A case study using skype, " in INFOCOM 06: Proceedings of the 25th IEEE International Conference on Computer Communications, Apr 2006.
-
(2006)
INFOCOM 06: Proceedings of the 25th IEEE International Conference on Computer Communications
-
-
Suh, K.1
Figueiredo, D.R.2
Kurose, J.3
Towsley, D.4
-
32
-
-
38349178234
-
Analysis and signature of skype VoIP session traffic
-
Nov/Dec
-
S. Ehlert, S. Petgang, T. Magedanz, and D. Sisalem, "Analysis and signature of skype VoIP session traffic, " in CIIT 2006: 4th IASTED International Conference on Communications, Internet, and Information Technology, Nov/Dec 2006, pp. 8389.
-
(2006)
CIIT 2006: 4th IASTED International Conference on Communications, Internet, and Information Technology
, pp. 8389
-
-
Ehlert, S.1
Petgang, S.2
Magedanz, T.3
Sisalem, D.4
-
33
-
-
84879202939
-
Detailed analysis of skype traffic
-
Jan
-
D. Bonfiglio, M. Mellia, M. Meo, D. Rossi, "Detailed analysis of skype traffic", IEEE Transactions on Multimedia, Vol. 11, No.1, Jan 2009.
-
(2009)
IEEE Transactions on Multimedia
, vol.11
, Issue.1
-
-
Bonfiglio, D.1
Mellia, M.2
Meo, M.3
Rossi, D.4
-
34
-
-
77950579824
-
-
IEEE
-
M. Perenyi, A. Gefferth, T. D. Drang, S. Molnar, "Skype traffic identification", IEEE, 2007.
-
(2007)
Skype Traffic Identification
-
-
Perenyi, M.1
Gefferth, A.2
Drang, T.D.3
Molnar, S.4
|