-
2
-
-
79955757126
-
Inherent behaviors of on-line detection of peer-to-peer file sharing
-
G. Barlett, J. Heidemann, C. Papadopoulos, Inherent behaviors of on-line detection of peer-to-peer file sharing, in: IEEE GI, 2007.
-
(2007)
IEEE GI
-
-
Barlett, G.1
Heidemann, J.2
Papadopoulos, C.3
-
4
-
-
36949009834
-
Revealing Skype Traffic: When randomness plays with you
-
D. Bonfiglio, M. Mellia, M. Meo, D. Rossi, P. Tofanelli, Revealing Skype Traffic: when randomness plays with you, in: ACM SIGCOMM, 2007.
-
(2007)
ACM SIGCOMM
-
-
Bonfiglio, D.1
Mellia, M.2
Meo, M.3
Rossi, D.4
Tofanelli, P.5
-
5
-
-
79955760261
-
-
CAIDA
-
CAIDA. http://www.caida.org.
-
-
-
-
6
-
-
70349659455
-
Hit-List worm detection and bot identification in large networks using protocol graphs
-
M.P. Collins, M.K. Reiter, Hit-List worm detection and bot identification in large networks using protocol graphs, in: RAID, 2007.
-
(2007)
RAID
-
-
Collins, M.P.1
Reiter, M.K.2
-
7
-
-
70349666974
-
Identifying known and unknown peer-to-peer traffic
-
F. Constantinou, P. Mavrommatis, Identifying known and unknown peer-to-peer traffic, in: IEEE NCA, 2006.
-
(2006)
IEEE NCA
-
-
Constantinou, F.1
Mavrommatis, P.2
-
9
-
-
85088735220
-
A behavioral approach to worm detection
-
D. Ellis, J. Aiken, K. Attwood, S. Tenarglia, A behavioral approach to worm detection, in: ACM CCS WORM, 2004.
-
(2004)
ACM CCS WORM
-
-
Ellis, D.1
Aiken, J.2
Attwood, K.3
Tenarglia, S.4
-
11
-
-
77956596133
-
On the stability of the information carried by traffic flow features at the packet level
-
A. Este, F. Gringoli, and L. Slagerelli On the stability of the information carried by traffic flow features at the packet level ACM SIGCOMM CCR 39 3 2009 13 18
-
(2009)
ACM SIGCOMM CCR
, vol.39
, Issue.3
, pp. 13-18
-
-
Este, A.1
Gringoli, F.2
Slagerelli, L.3
-
12
-
-
85077703150
-
Polymorphic blending attacks
-
P. Fogla, M. Sharif, R. Perdisci, O. Kolesnikov, W. Lee, Polymorphic blending attacks, in: USENIX Security Symposium, 2006.
-
(2006)
USENIX Security Symposium
-
-
Fogla, P.1
Sharif, M.2
Perdisci, R.3
Kolesnikov, O.4
Lee, W.5
-
13
-
-
3042598183
-
P2P, the Gorilla in the cable
-
A. Gerber, J. Houle, H. Nguyen, M. Roughan, S. Sen, P2P, the Gorilla in the cable, in: National Cable and Telecommunications Association (NCTA), 2003.
-
(2003)
National Cable and Telecommunications Association (NCTA)
-
-
Gerber, A.1
Houle, J.2
Nguyen, H.3
Roughan, M.4
Sen, S.5
-
14
-
-
85075837457
-
BotMiner: Clustering analysis of network traffic from protocol- and structure-independent botnet detection
-
G. Gu, R. Perdisci, J. Zhang, W. Lee. BotMiner: clustering analysis of network traffic from protocol- and structure-independent botnet detection, in: USENIX Security Symposium, 2008.
-
(2008)
USENIX Security Symposium
-
-
Gu, G.1
Perdisci, R.2
Zhang, J.3
Lee, W.4
-
15
-
-
29244451861
-
ACAS: Automated construction of application signatures
-
P. Haffner, S. Sen, O. Spatscheck, D. Wang, ACAS: automated construction of application signatures, in: ACM SIGCOMM MineNet, 2005.
-
(2005)
ACM SIGCOMM MineNet
-
-
Haffner, P.1
Sen, S.2
Spatscheck, O.3
Wang, D.4
-
16
-
-
76749108118
-
Exploiting dynamicity in graph-based traffic analysis: Techniques and applications
-
M. Iliofotou, M. Faloutsos, M. Mitzenmacher, Exploiting dynamicity in graph-based traffic analysis: techniques and applications, in: ACM CoNEXT, 2009.
-
(2009)
ACM CoNEXT
-
-
Iliofotou, M.1
Faloutsos, M.2
Mitzenmacher, M.3
-
17
-
-
79955775579
-
Profiling-by-association: A resilient traffic profiling solution for the internet backbone
-
M. Iliofotou, B. Gallagher, G. Xie, T. Eliassi-Rad, M. Faloutsos, Profiling-by-association: a resilient traffic profiling solution for the internet backbone, in: ACM CoNEXT, 2010.
-
(2010)
ACM CoNEXT
-
-
Iliofotou, M.1
Gallagher, B.2
Xie, G.3
Eliassi-Rad, T.4
Faloutsos, M.5
-
18
-
-
77955130499
-
Graph-based P2P traffic classification at the internet backbone
-
M. Iliofotou, H. Kim, P. Pappu, M. Faloutsos, M. Mitzenmacher, G. Varghese, Graph-based P2P traffic classification at the internet backbone, in: IEEE GI, 2009.
-
(2009)
IEEE GI
-
-
Iliofotou, M.1
Kim, H.2
Pappu, P.3
Faloutsos, M.4
Mitzenmacher, M.5
Varghese, G.6
-
19
-
-
70349686731
-
Network monitoring using traffic dispersion graphs (TDGs)
-
M. Iliofotou, P. Pappu, M. Faloutsos, M. Mitzenmacher, S. Singh, G. Varghese, Network monitoring using traffic dispersion graphs (TDGs), in: ACM IMC, 2007.
-
(2007)
ACM IMC
-
-
Iliofotou, M.1
Pappu, P.2
Faloutsos, M.3
Mitzenmacher, M.4
Singh, S.5
Varghese, G.6
-
21
-
-
70449686700
-
Unveiling core network-wide communication patterns through application traffic activity graph decomposition
-
Y. Jin, S. Esam, Z.L. Zhang, Unveiling core network-wide communication patterns through application traffic activity graph decomposition, in: ACM SIGMETRICS, 2009.
-
(2009)
ACM SIGMETRICS
-
-
Jin, Y.1
Esam, S.2
Zhang, Z.L.3
-
22
-
-
79955765293
-
Heuristics to classify internet backbone traffic based on connection patterns
-
W. John, S. Tafvelin, Heuristics to classify internet backbone traffic based on connection patterns, in: IEEE ICOIN, 2008.
-
(2008)
IEEE ICOIN
-
-
John, W.1
Tafvelin, S.2
-
23
-
-
18144414978
-
Is P2P dying or just hiding?
-
T. Karagiannis, A. Broido, N. Brownlee, K. Claffy, M. Faloutsos, Is P2P dying or just hiding? in: IEEE GLOBECOM, 2004.
-
(2004)
IEEE GLOBECOM
-
-
Karagiannis, T.1
Broido, A.2
Brownlee, N.3
Claffy, K.4
Faloutsos, M.5
-
24
-
-
34249311112
-
Transport layer identification of P2P traffic
-
T. Karagiannis, A. Broido, M. Faloutsos, K. claffy, Transport layer identification of P2P traffic, in: ACM IMC, 2004.
-
(2004)
ACM IMC
-
-
Karagiannis, T.1
Broido, A.2
Faloutsos, M.3
Claffy, K.4
-
26
-
-
70350771144
-
Internet traffic classification demystified: Myths, caveats, and the best practices
-
H. Kim, K. Claffy, M. Fomenkov, D. Barman, M. Faloutsos, K. Lee, Internet traffic classification demystified: myths, caveats, and the best practices, in: ACM CoNEXT, 2008.
-
(2008)
ACM CoNEXT
-
-
Kim, H.1
Claffy, K.2
Fomenkov, M.3
Barman, D.4
Faloutsos, M.5
Lee, K.6
-
27
-
-
78149331323
-
Internet inter-domain traffic
-
C. Labovitz, S. Lekel-johnson, J. Oberheide, F. Jahanian, Internet inter-domain traffic, in: ACM SIGCOMM, 2010.
-
(2010)
ACM SIGCOMM
-
-
Labovitz, C.1
Lekel-Johnson, S.2
Oberheide, J.3
Jahanian, F.4
-
28
-
-
70349678497
-
Unexpected means of protocol inference
-
J. Ma, K. Levchenko, C. Kreibich, S. Savage, G.M. Voelker, Unexpected means of protocol inference, in: ACM IMC, 2006.
-
(2006)
ACM IMC
-
-
Ma, J.1
Levchenko, K.2
Kreibich, C.3
Savage, S.4
Voelker, G.M.5
-
29
-
-
33845251186
-
Flow clustering using machine learning techniques
-
A. McGregor, M. Hall, P. Lorier, J. Brunskill, Flow clustering using machine learning techniques, in: PAM, 2004.
-
(2004)
PAM
-
-
McGregor, A.1
Hall, M.2
Lorier, P.3
Brunskill, J.4
-
30
-
-
34248339899
-
Toward the accurate identification of network applications
-
A. Moore, K. Papagiannaki, Toward the accurate identification of network applications, in: PAM, 2005.
-
(2005)
PAM
-
-
Moore, A.1
Papagiannaki, K.2
-
31
-
-
0038718854
-
The structure and function of complex networks
-
M.E.J. Newman The structure and function of complex networks SIAM Review 45 2003 167
-
(2003)
SIAM Review
, vol.45
, pp. 167
-
-
Newman, M.E.J.1
-
32
-
-
62849120844
-
A survey of techniques for internet traffic classification using machine learning
-
4th ed., March
-
T.T.T. Nguyen, G. Armitage, A survey of techniques for internet traffic classification using machine learning, IEEE Communications Surveys and Tutorials, 4th ed., March, 2008.
-
(2008)
IEEE Communications Surveys and Tutorials
-
-
Nguyen, T.T.T.1
Armitage, G.2
-
33
-
-
19944406146
-
Accurate, scalable in-network identification of p2p traffic using application signatures
-
S. Sen, O. Spatscheck, D. Wang, Accurate, scalable in-network identification of p2p traffic using application signatures, in: WWW, 2004.
-
(2004)
WWW
-
-
Sen, S.1
Spatscheck, O.2
Wang, D.3
-
34
-
-
2442537008
-
Analyzing peer-to-peer traffic across large networks
-
S. Sen, and J. Wang Analyzing peer-to-peer traffic across large networks IEEE/ACM Transaction on Networking 12 2 2004 219 232
-
(2004)
IEEE/ACM Transaction on Networking
, vol.12
, Issue.2
, pp. 219-232
-
-
Sen, S.1
Wang, J.2
-
35
-
-
85077580912
-
Role classification of hosts within enterprise networks based on connection patterns
-
G. Tan, M. Poletto, J. Guttag, F. Kaashoek, Role classification of hosts within enterprise networks based on connection patterns, in: USENIX Annual Technical Conference, 2003.
-
(2003)
USENIX Annual Technical Conference
-
-
Tan, G.1
Poletto, M.2
Guttag, J.3
Kaashoek, F.4
-
36
-
-
66249144888
-
Unconstrained endpoint profiling (Googling the Internet)
-
I. Trestian, S. Ranjan, A. Kuzmanovic, A. Nucci, Unconstrained endpoint profiling (Googling the Internet), in: ACM SIGCOMM, 2008.
-
(2008)
ACM SIGCOMM
-
-
Trestian, I.1
Ranjan, S.2
Kuzmanovic, A.3
Nucci, A.4
-
37
-
-
79955761119
-
Challenging statistical classification for operational usage: The ADSL case
-
G. Urvoy-Keller, T. En-Najjary, Challenging statistical classification for operational usage: the ADSL case, in: ACM IMC, 2009.
-
(2009)
ACM IMC
-
-
Urvoy-Keller, G.1
En-Najjary, T.2
-
39
-
-
70349670981
-
Forensic analysis of epidemic attacks in federated networks
-
Y. Xie, V. Sekar, D. Maltz, M. Reiter, H. Zhan, Forensic analysis of epidemic attacks in federated networks, in: IEEE ICNP, 2006.
-
(2006)
IEEE ICNP
-
-
Xie, Y.1
Sekar, V.2
Maltz, D.3
Reiter, M.4
Zhan, H.5
-
40
-
-
33750375994
-
Profiling internet backbone traffic: Behavior models and applications
-
K. Xu, Z. Zhang, S. Bhattacharyya, Profiling internet backbone traffic: behavior models and applications, in: ACM SIGCOMM, 2005.
-
(2005)
ACM SIGCOMM
-
-
Xu, K.1
Zhang, Z.2
Bhattacharyya, S.3
|