메뉴 건너뛰기




Volumn , Issue , 2010, Pages

Identification of traffic flows hiding behind TCP port 80

Author keywords

[No Author keywords available]

Indexed keywords

ENCRYPTED TRAFFIC; FIREWALL ARCHITECTURE; IDENTIFICATION APPROACH; NETWORK TRAFFIC; PORT NUMBERS; REAL TRAFFIC; SIGN PATTERNS; STAND -ALONE; TCP PORTS; TIME PERIODS; TRAFFIC FLOW; TRAFFIC IDENTIFICATION;

EID: 77955400669     PISSN: 05361486     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICC.2010.5502266     Document Type: Conference Paper
Times cited : (44)

References (34)
  • 1
    • 61749087248 scopus 로고    scopus 로고
    • Traffic classification and its applications to modern networks
    • April
    • M. Mellia, A. Pescapé, L. Salgarelli, "Traffic classification and its applications to modern networks", Computer Networks, Vol. 53, Issue 6, 759-760, April 2009.
    • (2009) Computer Networks , vol.53 , Issue.6 , pp. 759-760
    • Mellia, M.1    Pescapé, A.2    Salgarelli, L.3
  • 3
    • 34248339899 scopus 로고    scopus 로고
    • Toward the accurate identification of network applications
    • April
    • A. Moore and K. Papagiannaki. "Toward the accurate identification of network applications". In PAM, April 2005.
    • (2005) PAM
    • Moore, A.1    Papagiannaki, K.2
  • 5
    • 41549114402 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in realtime
    • V. Paxson, "Bro: A system for detecting network intruders in realtime". In Computer Networks, pages 23-24, 1999.
    • (1999) Computer Networks , pp. 23-24
    • Paxson, V.1
  • 7
    • 14344265818 scopus 로고    scopus 로고
    • Internet traffic classification using bayesian analysis techniques
    • June
    • A. Moore, D. Zuev. "Internet traffic classification using bayesian analysis techniques". In ACM SIGMETRICS, June 2005.
    • (2005) ACM SIGMETRICS
    • Moore, A.1    Zuev, D.2
  • 8
    • 50949098638 scopus 로고    scopus 로고
    • Internet traffic identification using machine learning
    • November
    • J. Erman, A. Mahanti, M. Arlitt. "Internet traffic identification using machine learning". In IEEE Globecom, November 2006.
    • (2006) IEEE Globecom
    • Erman, J.1    Mahanti, A.2    Arlitt, M.3
  • 9
    • 65249118724 scopus 로고    scopus 로고
    • Automated traffic classification and application identification using machine learning
    • Nov.
    • S. Zander, T. Nguyen, G. Armitage "Automated traffic classification and application identification using machine learning" IEEE LCN, Nov. 2005.
    • (2005) IEEE LCN
    • Zander, S.1    Nguyen, T.2    Armitage, G.3
  • 10
    • 33846098197 scopus 로고    scopus 로고
    • Bayesian neural networks for internet traffic classification
    • DOI 10.1109/TNN.2006.883010
    • T. Auld, A. Moore, S. Gull. "Bayesian neural networks for internet traffic classification". IEEE Trans. Neural Networks, 18(1):223-239, Jan. 2007 (Pubitemid 46062929)
    • (2007) IEEE Transactions on Neural Networks , vol.18 , Issue.1 , pp. 223-239
    • Auld, T.1    Moore, A.W.2    Gull, S.F.3
  • 14
    • 38049121051 scopus 로고    scopus 로고
    • Early recognition of encrypted Applications
    • L. Bernaille and R. Teixeira. "Early recognition of encrypted Applications". In PAM 2007, pages 165-175.
    • (2007) PAM , pp. 165-175
    • Bernaille, L.1    Teixeira, R.2
  • 15
    • 58049120447 scopus 로고    scopus 로고
    • Self-learning ip traffic classification based on statistical flow characteristics
    • S. Zander, T. Nguyen, G. Armitage. "Self-learning ip traffic classification based on statistical flow characteristics". In PAM, 2005.
    • (2005) PAM
    • Zander, S.1    Nguyen, T.2    Armitage, G.3
  • 16
    • 33750283653 scopus 로고    scopus 로고
    • A preliminary performance comparison of five machine learning algorithms for practical ip traffic flow classification
    • October
    • N. Williams, S. Zander, G. Armitage. "A preliminary performance comparison of five machine learning algorithms for practical ip traffic flow classification". ACM SIGCOMM CCR, 36(5):7-15, October 2006.
    • (2006) ACM SIGCOMM CCR , vol.36 , Issue.5 , pp. 7-15
    • Williams, N.1    Zander, S.2    Armitage, G.3
  • 19
    • 33845735523 scopus 로고    scopus 로고
    • On inferring application protocol behaviors in encrypted network traffic
    • December
    • C. V. Wright, F. Monrose, G. M. Masson. "On inferring application protocol behaviors in encrypted network traffic". Journal of Machine Learning Research, 7:2745-2769, December 2006.
    • (2006) Journal of Machine Learning Research , vol.7 , pp. 2745-2769
    • Wright, C.V.1    Monrose, F.2    Masson, G.M.3
  • 22
    • 77955410946 scopus 로고    scopus 로고
    • http://tie.comics.unina.it
  • 27
    • 48049094543 scopus 로고    scopus 로고
    • On metrics to distinguish skype flows from http traffic
    • E.P. Freire, A. Ziviani, R.M. Salles. "On metrics to distinguish skype flows from http traffic", LANOMS 2007, pages 57-66, 2007.
    • (2007) LANOMS 2007 , pp. 57-66
    • Freire, E.P.1    Ziviani, A.2    Salles, R.M.3
  • 28
    • 33750283653 scopus 로고    scopus 로고
    • A Preliminary Performance Comparison of Five Machine Learning Algorithms for Practical IP Traffic Flow Classification
    • N. Williams, S. Zander, G. Armitage: "A Preliminary Performance Comparison of Five Machine Learning Algorithms for Practical IP Traffic Flow Classification". ACM SIGCOMM CCR, 36(5), 7-15 2006.
    • (2006) ACM SIGCOMM CCR , vol.36 , Issue.5 , pp. 7-15
    • Williams, N.1    Zander, S.2    Armitage, G.3
  • 30
    • 77955370476 scopus 로고    scopus 로고
    • http://l7-filter.sourceforge.net/
  • 31
    • 77955412057 scopus 로고    scopus 로고
    • http://www.caida.org/data/
  • 33
    • 77955408982 scopus 로고    scopus 로고
    • http://ee.lbl.gov/anonymized-traces.html
  • 34
    • 77955361544 scopus 로고    scopus 로고
    • http://www.grid.unina.it/Traffic/Traces


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.