메뉴 건너뛰기




Volumn , Issue , 2011, Pages 95-102

Traffic causality graphs: Profiling network applications through temporal and spatial causality of flows

Author keywords

[No Author keywords available]

Indexed keywords

APPLICATION PROGRAMS; APPLICATION PROTOCOLS; DATA SETS; GROUND TRUTH; NETWORK APPLICATIONS; NETWORK OPERATOR; PACKET PAYLOADS; PROFILING APPLICATION; ROOT CAUSE; USER AGENTS;

EID: 80054978961     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (14)

References (22)
  • 2
    • 80054980776 scopus 로고    scopus 로고
    • Sourcefire, Inc.
    • Sourcefire, Inc., "Snort." http://www.snort.org/.
  • 4
    • 80054967543 scopus 로고    scopus 로고
    • OpenDPI.org
    • OpenDPI.org, "OpenDPI." http://www.opendpi.org/.
  • 5
    • 19944406146 scopus 로고    scopus 로고
    • Accurate, scalable in-network identification of P2P traffic using application signatures
    • S. Sen, O. Spatscheck, and D. Wang, "Accurate, scalable in-network identification of P2P traffic using application signatures," in WWW '04, pp. 512-521, 2004.
    • (2004) WWW '04 , pp. 512-521
    • Sen, S.1    Spatscheck, O.2    Wang, D.3
  • 7
    • 24344442716 scopus 로고    scopus 로고
    • Toward the accurate identification of network applications
    • A. W. Moore and K. Papagiannaki, "Toward the accurate identification of network applications," in PAM '05, vol. 3431, pp. 41-54, 2005.
    • (2005) PAM '05 , vol.3431 , pp. 41-54
    • Moore, A.W.1    Papagiannaki, K.2
  • 8
    • 33244467936 scopus 로고    scopus 로고
    • Internet traffic classification using Bayesian analysis techniques
    • A. W. Moore and D. Zuev, "Internet traffic classification using bayesian analysis techniques," in ACM SIGMETRICS '05, pp. 50-60, 2005.
    • (2005) ACM SIGMETRICS '05 , pp. 50-60
    • Moore, A.W.1    Zuev, D.2
  • 10
    • 35348815604 scopus 로고    scopus 로고
    • Identifying and discriminating between web and peer-to-peer traffic in the network core
    • J. Erman, A. Mahanti, M. Arlitt, and C. Williamson, "Identifying and discriminating between web and peer-to-peer traffic in the network core," in WWW '07, pp. 883-892, 2007.
    • (2007) WWW '07 , pp. 883-892
    • Erman, J.1    Mahanti, A.2    Arlitt, M.3    Williamson, C.4
  • 11
    • 62949129764 scopus 로고    scopus 로고
    • Extracting hidden anomalies using sketch and non Gaussian multiresolution statistical detection procedures
    • G. Dewaele, K. Fukuda, P. Borgnat, P. Abry, and K. Cho, "Extracting hidden anomalies using sketch and non gaussian multiresolution statistical detection procedures," in ACM SIGCOMM LSAD '07, pp. 145-152, 2007.
    • (2007) ACM SIGCOMM LSAD '07 , pp. 145-152
    • Dewaele, G.1    Fukuda, K.2    Borgnat, P.3    Abry, P.4    Cho, K.5
  • 12
    • 65249141597 scopus 로고    scopus 로고
    • Unconstrained endpoint profiling (Googling the internet)
    • I. Trestian, S. Ranjan, A. Kuzmanovi, and A. Nucci, "Unconstrained endpoint profiling (Googling the Internet)," in ACM SIGCOMM '08, pp. 279-290, 2008.
    • (2008) ACM SIGCOMM '08 , pp. 279-290
    • Trestian, I.1    Ranjan, S.2    Kuzmanovi, A.3    Nucci, A.4
  • 16
    • 76749108118 scopus 로고    scopus 로고
    • Exploiting dynam-icity in graph-based traffic analysis: Techniques and applications
    • M. Iliofotou, M. Faloutsos, and M. Mitzenmacher, "Exploiting dynam-icity in graph-based traffic analysis: Techniques and applications," in ACM CoNEXT '09, pp. 241-252, 2009.
    • (2009) ACM CoNEXT '09 , pp. 241-252
    • Iliofotou, M.1    Faloutsos, M.2    Mitzenmacher, M.3
  • 17
    • 70449686700 scopus 로고    scopus 로고
    • Unveiling core network-wide communication patterns through application traffic activity graph decomposition
    • Y. Jin, E. Sharafuddin, and Z.-L. Zhang, "Unveiling core network-wide communication patterns through application traffic activity graph decomposition," in ACM SIGMETRICS '09, pp. 49-60, 2009.
    • (2009) ACM SIGMETRICS '09 , pp. 49-60
    • Jin, Y.1    Sharafuddin, E.2    Zhang, Z.-L.3
  • 19
    • 79951601753 scopus 로고    scopus 로고
    • Profiling-by-association: A resilient traffic profiling solution for the internet backbone
    • ACM
    • M. Iliofotou, B. Gallagher, T. Eliassi-Rad, G. Xie, and M. Faloutsos, "Profiling-by-association: A resilient traffic profiling solution for the Internet backbone," in CoNEXT '10, p. 12, ACM, 2010.
    • (2010) CoNEXT '10 , pp. 12
    • Iliofotou, M.1    Gallagher, B.2    Eliassi-Rad, T.3    Xie, G.4    Faloutsos, M.5
  • 20
    • 76749163352 scopus 로고    scopus 로고
    • Macro-scope: End-point approach to networked application dependency discovery
    • L. Popa, B.-G. Chun, I. Stoica, J. Chandrashekar, and N. Taft, "Macro-scope: End-point approach to networked application dependency discovery," in ACM CoNEXT '09, pp. 229-240, 2009.
    • (2009) ACM CoNEXT '09 , pp. 229-240
    • Popa, L.1    Chun, B.-G.2    Stoica, I.3    Chandrashekar, J.4    Taft, N.5
  • 21
    • 65249128484 scopus 로고    scopus 로고
    • What's going on?: Learning communication rules in edge networks
    • S. Kandula, R. Chandra, and D. Katabi, "What's going on?: Learning communication rules in edge networks," in ACM SIGCOMM '08, pp. 87-98, 2008.
    • (2008) ACM SIGCOMM '08 , pp. 87-98
    • Kandula, S.1    Chandra, R.2    Katabi, D.3
  • 22
    • 80054970470 scopus 로고    scopus 로고
    • Identifying the use of data/voice/video-based P2P traffic by DNS-query behavior
    • H.-S. Wu, N.-F. Huang, and G.-H. Lin, "Identifying the use of data/voice/video-based P2P traffic by DNS-query behavior," in IEEE ICC '09, p. 5, 2009.
    • (2009) IEEE ICC '09 , pp. 5
    • Wu, H.-S.1    Huang, N.-F.2    Lin, G.-H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.