메뉴 건너뛰기




Volumn , Issue , 2011, Pages 9-16

Flow signatures of popular applications

Author keywords

[No Author keywords available]

Indexed keywords

APPLICATION SIGNATURES; APPLICATION SPECIFIC; FLOW QUERY LANGUAGES; FLOW SIGNATURE; HARDWARE AND SOFTWARE; NETWORK FLOWS; TRAFFIC TRACES;

EID: 80052708742     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INM.2011.5990668     Document Type: Conference Paper
Times cited : (8)

References (26)
  • 1
    • 33746913393 scopus 로고    scopus 로고
    • Cisco systems NetFlow services export version 9
    • Oct.
    • B. Claise, "Cisco Systems NetFlow Services Export Version 9," RFC 3954, Oct. 2004.
    • (2004) RFC 3954
    • Claise, B.1
  • 3
    • 80052704033 scopus 로고    scopus 로고
    • Design of a stream-based IP flow record query language
    • Springer, Oct.
    • V. Marinov and J. Schönwälder, "Design of a Stream-based IP Flow Record Query Language," in Proc. DSOM 2009. Springer, Oct. 2009.
    • (2009) Proc. DSOM 2009
    • Marinov, V.1    Schönwälder, J.2
  • 4
    • 80052773417 scopus 로고    scopus 로고
    • Implementation of a stream-based IP flow record query language
    • Springer, Jun.
    • K. Kanev, N. Melnikov, and J. Schönwälder, "Implementation of a Stream-based IP Flow Record Query Language," in Proc. of AIMS 2010. Springer, Jun. 2010.
    • (2010) Proc. of AIMS 2010
    • Kanev, K.1    Melnikov, N.2    Schönwälder, J.3
  • 6
    • 33750309882 scopus 로고    scopus 로고
    • An analysis of the skype peer-to-peer internet telephony protocol
    • IEEE
    • S. Baset and H. Schulzrinne, "An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol," in Proc. oflNFOCOM 2006. IEEE, 2006.
    • (2006) Proc. OflNFOCOM 2006
    • Baset, S.1    Schulzrinne, H.2
  • 7
    • 80052743733 scopus 로고    scopus 로고
    • Revealing skype traffic: When randomness plays with you
    • Oct.
    • D. Bonfiglio, M. Mellia, M. Meo, D. Rossi, and P. Tofanelli, "Revealing Skype Traffic: When Randomness Plays with You," SIGCOMM CCR, vol. 37, no. 4, Oct. 2007.
    • (2007) SIGCOMM CCR , vol.37 , Issue.4
    • Bonfiglio, D.1    Mellia, M.2    Meo, M.3    Rossi, D.4    Tofanelli, P.5
  • 10
    • 1642305819 scopus 로고    scopus 로고
    • STUN - Simple traversal of user datagram protocol (UDP) through network address translators (NATs)
    • Mar.
    • J. Rosenberg, J. Weinberger, C. Huitema, and R. Mahy, "STUN - Simple Traversal of User Datagram Protocol (UDP) Through Network Address Translators (NATs)," RFC 3489, Mar. 2003.
    • (2003) RFC 3489
    • Rosenberg, J.1    Weinberger, J.2    Huitema, C.3    Mahy, R.4
  • 11
    • 34848889285 scopus 로고    scopus 로고
    • Understanding instant messaging traffic characteristics
    • IEEE, Jun.
    • Z. Xiao, L. Guo, and J. Tracey, "Understanding Instant Messaging Traffic Characteristics," in Proc. of ICDCS 2007. IEEE, Jun. 2007.
    • (2007) Proc. of ICDCS 2007
    • Xiao, Z.1    Guo, L.2    Tracey, J.3
  • 12
    • 0012359238 scopus 로고    scopus 로고
    • Post office protocol - Version 3
    • May
    • J. Myers and M. Rose, "Post Office Protocol - Version 3," RFC 1939, May 1996.
    • (1996) RFC 1939
    • Myers, J.1    Rose, M.2
  • 13
    • 21644483570 scopus 로고    scopus 로고
    • Internet message access protocol -version 4revl
    • Mar.
    • M. Crispin, "Internet Message Access Protocol -Version 4revl," RFC 3501, Mar. 2003.
    • (2003) RFC 3501
    • Crispin, M.1
  • 15
    • 0020849266 scopus 로고
    • Maintaining knowledge about temporal intervals
    • Nov.
    • J. F. Allen, "Maintaining Knowledge about Temporal Intervals," Communications of the ACM, vol. 26, no. 11, pp. 832-843, Nov. 1983.
    • (1983) Communications of the ACM , vol.26 , Issue.11 , pp. 832-843
    • Allen, J.F.1
  • 16
    • 24344442716 scopus 로고    scopus 로고
    • Toward the accurate identification of network applications
    • A. Moore and K. Papagiannaki, "Toward the accurate identification of network applications," in Proc. PAM 2005, 2005, pp. 41-54.
    • (2005) Proc. PAM 2005 , pp. 41-54
    • Moore, A.1    Papagiannaki, K.2
  • 18
    • 19944406146 scopus 로고    scopus 로고
    • Accurate, scalable in-network identification of P2P traffic using application signatures
    • ACM
    • S. Sen, O. Spatscheck, and D. Wang, "Accurate, Scalable In-network Identification of P2P Traffic Using Application Signatures," in Proc. of WWW 2004. ACM, 2004.
    • (2004) Proc. of WWW 2004
    • Sen, S.1    Spatscheck, O.2    Wang, D.3
  • 21
    • 43949093547 scopus 로고    scopus 로고
    • Identification and analysis of peer-to-peer traffic
    • M. Perényi, T. D. Dang, A. Gefferth, and S. Molnár, "Identification and analysis of peer-to-peer traffic," JCM, vol. 1, no. 7, pp. 36-46, 2006.
    • (2006) JCM , vol.1 , Issue.7 , pp. 36-46
    • Perényi, M.1    Dang, T.D.2    Gefferth, A.3    Molnár, S.4
  • 22
    • 80052744643 scopus 로고    scopus 로고
    • Empirical analysis of application-level traffic classification using supervised machine learning
    • Springer
    • B. Park, Y J. Won, M.-J. Choi, M.-S. Kim, and J. W Hong, "Empirical analysis of application-level traffic classification using supervised machine learning," in Proc. of APNOMS 2008. Springer, 2008.
    • (2008) Proc. of APNOMS 2008
    • Park, B.1    Won, Y.J.2    Choi, M.-J.3    Kim, M.-S.4    Hong, J.W.5
  • 23
    • 33847290520 scopus 로고    scopus 로고
    • Mining anomalies using traffic feature distributions
    • A. Lakhina, M. Crovella, and C. Diot, "Mining anomalies using traffic feature distributions," SIGCOMM CCR, vol. 35, no. 4, 2005.
    • (2005) SIGCOMM CCR , vol.35 , Issue.4
    • Lakhina, A.1    Crovella, M.2    Diot, C.3
  • 24
    • 33846190721 scopus 로고    scopus 로고
    • Host behaviour based early detection of worm outbreaks in internet backbones
    • IEEE
    • T. Dubendorfer and B. Plattner, "Host behaviour based early detection of worm outbreaks in internet backbones," in Proc. of WETICE 2005. IEEE, 2005.
    • (2005) Proc. of WETICE 2005
    • Dubendorfer, T.1    Plattner, B.2
  • 25
    • 43949111011 scopus 로고    scopus 로고
    • A two-layered anomaly detection technique based on multi-modal flow behavior models
    • M. P. Stoecklin, J.-Y L. Boudec, and A. Kind, "A two-layered anomaly detection technique based on multi-modal flow behavior models," in PAM, 2008, pp. 212-221.
    • (2008) PAM , pp. 212-221
    • Stoecklin, M.P.1    Boudec, J.-Y.L.2    Kind, A.3
  • 26
    • 33947634049 scopus 로고    scopus 로고
    • A DoS resilient flow-level intrusion detection approach for high-speed networks
    • IEEE
    • Y Gao, Z. Li, and Y Chen, "A DoS Resilient Flow-level Intrusion Detection Approach for High-speed Networks," in Proc. of ICDCS 2006. IEEE, 2006.
    • (2006) Proc. of ICDCS 2006
    • Gao, Y.1    Li, Z.2    Chen, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.