메뉴 건너뛰기




Volumn , Issue , 2010, Pages

Measurement and diagnosis of address misconfigured P2P traffic

Author keywords

[No Author keywords available]

Indexed keywords

BITTORRENT; DATA SETS; DESIGN APPROACHES; END USERS; EXCHANGE PROTOCOLS; FALSE POSITIVE; FILE DOWNLOADING; HONEYNET; INTERNET BACKGROUND RADIATION; MEASUREMENT TOOLS; MISCONFIGURATIONS; ORDER PROBLEMS; P2P SOFTWARE; P2P SYSTEM; RESOURCE MAPPING; ROOT CAUSE; UNWANTED TRAFFIC;

EID: 77953328281     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOM.2010.5461939     Document Type: Conference Paper
Times cited : (15)

References (31)
  • 2
    • 69849109516 scopus 로고    scopus 로고
    • Using honeynets for internet situational awareness
    • V. Yegneswaran et al., "Using honeynets for internet situational awareness," in In Proc. of ACM Hotnets IV, 2005.
    • (2005) In Proc. of ACM Hotnets , vol.4
    • Yegneswaran, V.1
  • 6
    • 34547421426 scopus 로고    scopus 로고
    • The index poisoning attack in P2P file-sharing systems
    • J. Liang et al., "The index poisoning attack in P2P file-sharing systems," in Proc. of IEEE INFOCOM, 2006.
    • Proc. of IEEE INFOCOM, 2006
    • Liang, J.1
  • 10
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • V. Paxson, "Bro: A system for detecting network intruders in real-time," Computer Networks, vol. 31, 1999.
    • (1999) Computer Networks , vol.31
    • Paxson, V.1
  • 11
    • 84866519046 scopus 로고    scopus 로고
    • "Ip to asn mapping," http://www.team-cymru.org/Services/ip-to- asn.html.
    • Ip to Asn Mapping
  • 13
    • 84971565665 scopus 로고    scopus 로고
    • The dark oracle: Perspective-aware unused and unreachable address discovery
    • E. Cooke et al., "The dark oracle: Perspective-aware unused and unreachable address discovery," in Proc. of USENIX NSDI, 2006.
    • Proc. of USENIX NSDI, 2006
    • Cooke, E.1
  • 15
    • 77952345594 scopus 로고    scopus 로고
    • P2p doctor: Measurement and diagnosis of misconfigured peer-to-peer traffic
    • Northwestern University
    • Z. Li, A. Goyal, Y. Chen, and A. Kuzmanovic, "P2p doctor: Measurement and diagnosis of misconfigured peer-to-peer traffic," Tech. Rep. NWU-EECS-07-06, Northwestern University, 2009.
    • (2009) Tech. Rep. NWU-EECS-07-06
    • Li, Z.1    Goyal, A.2    Chen, Y.3    Kuzmanovic, A.4
  • 19
    • 2442461224 scopus 로고    scopus 로고
    • Measurement, modeling, and analysis of a peer-to-peer file-sharing workload
    • K. Gummadi et al., "Measurement, modeling, and analysis of a peer-to-peer file-sharing workload," in Proc. of ACM SOSP, 2003.
    • Proc. of ACM SOSP, 2003
    • Gummadi, K.1
  • 22
    • 30044436588 scopus 로고    scopus 로고
    • Content availability, pollution and poisoning in file sharing peer-to-peer networks
    • N. Christin et al., "Content availability, pollution and poisoning in file sharing peer-to-peer networks," in Proc. of ACM Electronic Commerce, 2005.
    • Proc. of ACM Electronic Commerce, 2005
    • Christin, N.1
  • 24
    • 79960508731 scopus 로고    scopus 로고
    • Wids checker: Combating bugs in distributed systems
    • X. Liu et al., "Wids checker: Combating bugs in distributed systems," in NSDI, 2007.
    • (2007) NSDI
    • Liu, X.1
  • 25
    • 85094320514 scopus 로고    scopus 로고
    • Friday: Global comprehension for distributed replay
    • D. Geels et al., "Friday: Global comprehension for distributed replay," in NSDI, 2007.
    • (2007) NSDI
    • Geels, D.1
  • 26
    • 34748915764 scopus 로고    scopus 로고
    • Using queries for distributed monitoring and forensics
    • A. Singh et al., "Using queries for distributed monitoring and forensics," in EuroSys, 2006.
    • (2006) EuroSys
    • Singh, A.1
  • 27
    • 72849144813 scopus 로고    scopus 로고
    • D3s: Debugging deployed distributed systems
    • X. Liu et al., "D3s: Debugging deployed distributed systems," in NSDI, 2008.
    • (2008) NSDI
    • Liu, X.1
  • 28
    • 9144246153 scopus 로고    scopus 로고
    • Performance debugging for distributed systems of black boxes
    • M. K. Aguilera et al., "Performance debugging for distributed systems of black boxes," in ACM SOSP, 2003.
    • (2003) ACM SOSP
    • Aguilera, M.K.1
  • 29
    • 85030750455 scopus 로고    scopus 로고
    • Using magpie for request extraction and workload modelling
    • P. Barham et al., "Using magpie for request extraction and workload modelling," in OSDI, 2004.
    • (2004) OSDI
    • Barham, P.1
  • 30
    • 36949029788 scopus 로고    scopus 로고
    • Towards highly reliable enterprise network services via inference of multi-level dependencies
    • P. Bahl, R. Chandra, A. Greenberg, S. Kandula, D. A. Maltz, and M. Zhang, "Towards highly reliable enterprise network services via inference of multi-level dependencies," in ACM SIGCOMM, 2007.
    • (2007) ACM SIGCOMM
    • Bahl, P.1    Chandra, R.2    Greenberg, A.3    Kandula, S.4    Maltz, D.A.5    Zhang, M.6
  • 31
    • 56249086779 scopus 로고    scopus 로고
    • Finding liveness bugs in system code
    • C. Killian et al., "Finding liveness bugs in system code," in NSDI, 2007.
    • (2007) NSDI
    • Killian, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.