메뉴 건너뛰기




Volumn 55, Issue 8, 2011, Pages 1909-1920

Graption: A graph-based P2P traffic classification framework for the internet backbone

Author keywords

Behavioral approach; Graph mining; Peer to peer; Traffic classification

Indexed keywords

BEHAVIORAL-APPROACH; CLASSIFICATION FRAMEWORK; DISPERSION GRAPH; FLOW-LEVEL; GRAPH MINING; GRAPH-BASED; HOST-BASED; INTERNET APPLICATION; INTERNET BACKBONE; IP ADDRESSS; MONITORING NETWORK; NETWORK ADMINISTRATOR; NEW APPLICATIONS; PEER TO PEER; PROOF OF CONCEPT; TRAFFIC CLASSIFICATION;

EID: 79955760469     PISSN: 13891286     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comnet.2011.01.020     Document Type: Article
Times cited : (55)

References (40)
  • 1
    • 77951575957 scopus 로고    scopus 로고
    • Using network motifs to identify application protocols
    • E.G. Allan, W.H. Turkett, E.W. Fulp, Using network motifs to identify application protocols, in: IEEE GLOBECOM, 2009.
    • (2009) IEEE GLOBECOM
    • Allan, E.G.1    Turkett, W.H.2    Fulp, E.W.3
  • 2
    • 79955757126 scopus 로고    scopus 로고
    • Inherent behaviors of on-line detection of peer-to-peer file sharing
    • G. Barlett, J. Heidemann, C. Papadopoulos, Inherent behaviors of on-line detection of peer-to-peer file sharing, in: IEEE GI, 2007.
    • (2007) IEEE GI
    • Barlett, G.1    Heidemann, J.2    Papadopoulos, C.3
  • 5
    • 79955760261 scopus 로고    scopus 로고
    • CAIDA
    • CAIDA. http://www.caida.org.
  • 6
    • 70349659455 scopus 로고    scopus 로고
    • Hit-List worm detection and bot identification in large networks using protocol graphs
    • M.P. Collins, M.K. Reiter, Hit-List worm detection and bot identification in large networks using protocol graphs, in: RAID, 2007.
    • (2007) RAID
    • Collins, M.P.1    Reiter, M.K.2
  • 7
    • 70349666974 scopus 로고    scopus 로고
    • Identifying known and unknown peer-to-peer traffic
    • F. Constantinou, P. Mavrommatis, Identifying known and unknown peer-to-peer traffic, in: IEEE NCA, 2006.
    • (2006) IEEE NCA
    • Constantinou, F.1    Mavrommatis, P.2
  • 11
    • 77956596133 scopus 로고    scopus 로고
    • On the stability of the information carried by traffic flow features at the packet level
    • A. Este, F. Gringoli, and L. Slagerelli On the stability of the information carried by traffic flow features at the packet level ACM SIGCOMM CCR 39 3 2009 13 18
    • (2009) ACM SIGCOMM CCR , vol.39 , Issue.3 , pp. 13-18
    • Este, A.1    Gringoli, F.2    Slagerelli, L.3
  • 14
    • 85075837457 scopus 로고    scopus 로고
    • BotMiner: Clustering analysis of network traffic from protocol- and structure-independent botnet detection
    • G. Gu, R. Perdisci, J. Zhang, W. Lee. BotMiner: clustering analysis of network traffic from protocol- and structure-independent botnet detection, in: USENIX Security Symposium, 2008.
    • (2008) USENIX Security Symposium
    • Gu, G.1    Perdisci, R.2    Zhang, J.3    Lee, W.4
  • 16
    • 76749108118 scopus 로고    scopus 로고
    • Exploiting dynamicity in graph-based traffic analysis: Techniques and applications
    • M. Iliofotou, M. Faloutsos, M. Mitzenmacher, Exploiting dynamicity in graph-based traffic analysis: techniques and applications, in: ACM CoNEXT, 2009.
    • (2009) ACM CoNEXT
    • Iliofotou, M.1    Faloutsos, M.2    Mitzenmacher, M.3
  • 17
    • 79955775579 scopus 로고    scopus 로고
    • Profiling-by-association: A resilient traffic profiling solution for the internet backbone
    • M. Iliofotou, B. Gallagher, G. Xie, T. Eliassi-Rad, M. Faloutsos, Profiling-by-association: a resilient traffic profiling solution for the internet backbone, in: ACM CoNEXT, 2010.
    • (2010) ACM CoNEXT
    • Iliofotou, M.1    Gallagher, B.2    Xie, G.3    Eliassi-Rad, T.4    Faloutsos, M.5
  • 21
    • 70449686700 scopus 로고    scopus 로고
    • Unveiling core network-wide communication patterns through application traffic activity graph decomposition
    • Y. Jin, S. Esam, Z.L. Zhang, Unveiling core network-wide communication patterns through application traffic activity graph decomposition, in: ACM SIGMETRICS, 2009.
    • (2009) ACM SIGMETRICS
    • Jin, Y.1    Esam, S.2    Zhang, Z.L.3
  • 22
    • 79955765293 scopus 로고    scopus 로고
    • Heuristics to classify internet backbone traffic based on connection patterns
    • W. John, S. Tafvelin, Heuristics to classify internet backbone traffic based on connection patterns, in: IEEE ICOIN, 2008.
    • (2008) IEEE ICOIN
    • John, W.1    Tafvelin, S.2
  • 26
    • 70350771144 scopus 로고    scopus 로고
    • Internet traffic classification demystified: Myths, caveats, and the best practices
    • H. Kim, K. Claffy, M. Fomenkov, D. Barman, M. Faloutsos, K. Lee, Internet traffic classification demystified: myths, caveats, and the best practices, in: ACM CoNEXT, 2008.
    • (2008) ACM CoNEXT
    • Kim, H.1    Claffy, K.2    Fomenkov, M.3    Barman, D.4    Faloutsos, M.5    Lee, K.6
  • 29
  • 30
    • 34248339899 scopus 로고    scopus 로고
    • Toward the accurate identification of network applications
    • A. Moore, K. Papagiannaki, Toward the accurate identification of network applications, in: PAM, 2005.
    • (2005) PAM
    • Moore, A.1    Papagiannaki, K.2
  • 31
    • 0038718854 scopus 로고    scopus 로고
    • The structure and function of complex networks
    • M.E.J. Newman The structure and function of complex networks SIAM Review 45 2003 167
    • (2003) SIAM Review , vol.45 , pp. 167
    • Newman, M.E.J.1
  • 32
    • 62849120844 scopus 로고    scopus 로고
    • A survey of techniques for internet traffic classification using machine learning
    • 4th ed., March
    • T.T.T. Nguyen, G. Armitage, A survey of techniques for internet traffic classification using machine learning, IEEE Communications Surveys and Tutorials, 4th ed., March, 2008.
    • (2008) IEEE Communications Surveys and Tutorials
    • Nguyen, T.T.T.1    Armitage, G.2
  • 33
    • 19944406146 scopus 로고    scopus 로고
    • Accurate, scalable in-network identification of p2p traffic using application signatures
    • S. Sen, O. Spatscheck, D. Wang, Accurate, scalable in-network identification of p2p traffic using application signatures, in: WWW, 2004.
    • (2004) WWW
    • Sen, S.1    Spatscheck, O.2    Wang, D.3
  • 34
    • 2442537008 scopus 로고    scopus 로고
    • Analyzing peer-to-peer traffic across large networks
    • S. Sen, and J. Wang Analyzing peer-to-peer traffic across large networks IEEE/ACM Transaction on Networking 12 2 2004 219 232
    • (2004) IEEE/ACM Transaction on Networking , vol.12 , Issue.2 , pp. 219-232
    • Sen, S.1    Wang, J.2
  • 37
    • 79955761119 scopus 로고    scopus 로고
    • Challenging statistical classification for operational usage: The ADSL case
    • G. Urvoy-Keller, T. En-Najjary, Challenging statistical classification for operational usage: the ADSL case, in: ACM IMC, 2009.
    • (2009) ACM IMC
    • Urvoy-Keller, G.1    En-Najjary, T.2
  • 39
    • 70349670981 scopus 로고    scopus 로고
    • Forensic analysis of epidemic attacks in federated networks
    • Y. Xie, V. Sekar, D. Maltz, M. Reiter, H. Zhan, Forensic analysis of epidemic attacks in federated networks, in: IEEE ICNP, 2006.
    • (2006) IEEE ICNP
    • Xie, Y.1    Sekar, V.2    Maltz, D.3    Reiter, M.4    Zhan, H.5
  • 40
    • 33750375994 scopus 로고    scopus 로고
    • Profiling internet backbone traffic: Behavior models and applications
    • K. Xu, Z. Zhang, S. Bhattacharyya, Profiling internet backbone traffic: behavior models and applications, in: ACM SIGCOMM, 2005.
    • (2005) ACM SIGCOMM
    • Xu, K.1    Zhang, Z.2    Bhattacharyya, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.