-
1
-
-
14944345677
-
Transport layer identification of P2P traffic
-
T. Karagiannis, A. Broido, M. Faloutsos, and K. claffy, "Transport layer identification of P2P traffic," in ACM IMC '04, pp. 121-134, 2004.
-
(2004)
ACM IMC '04
, pp. 121-134
-
-
Karagiannis, T.1
Broido, A.2
Faloutsos, M.3
Claffy, K.4
-
2
-
-
80054980776
-
-
Sourcefire, Inc.
-
Sourcefire, Inc., "Snort." http://www.snort.org/.
-
-
-
-
4
-
-
80054967543
-
-
OpenDPI.org
-
OpenDPI.org, "OpenDPI." http://www.opendpi.org/.
-
-
-
-
5
-
-
19944406146
-
Accurate, scalable in-network identification of P2P traffic using application signatures
-
S. Sen, O. Spatscheck, and D. Wang, "Accurate, scalable in-network identification of P2P traffic using application signatures," in WWW '04, pp. 512-521, 2004.
-
(2004)
WWW '04
, pp. 512-521
-
-
Sen, S.1
Spatscheck, O.2
Wang, D.3
-
6
-
-
29244451861
-
ACAS: Automated construction of application signatures
-
MineNet '05
-
P. Haffner, S. Sen, O. Spatscheck, and D. Wang, "ACAS: Automated construction of application signatures," in ACM SIGCOMM MineNet Workshop '05, MineNet '05, pp. 197-202, 2005.
-
(2005)
ACM SIGCOMM MineNet Workshop '05
, pp. 197-202
-
-
Haffner, P.1
Sen, S.2
Spatscheck, O.3
Wang, D.4
-
7
-
-
24344442716
-
Toward the accurate identification of network applications
-
A. W. Moore and K. Papagiannaki, "Toward the accurate identification of network applications," in PAM '05, vol. 3431, pp. 41-54, 2005.
-
(2005)
PAM '05
, vol.3431
, pp. 41-54
-
-
Moore, A.W.1
Papagiannaki, K.2
-
8
-
-
33244467936
-
Internet traffic classification using Bayesian analysis techniques
-
A. W. Moore and D. Zuev, "Internet traffic classification using bayesian analysis techniques," in ACM SIGMETRICS '05, pp. 50-60, 2005.
-
(2005)
ACM SIGMETRICS '05
, pp. 50-60
-
-
Moore, A.W.1
Zuev, D.2
-
9
-
-
48749130030
-
Traffic classification through simple statistical fingerprinting
-
M. Crotti, M. Dusi, F. Gringoli, and L. Salgarelli, "Traffic classification through simple statistical fingerprinting," ACM SIGCOMM Comput. Commun. Rev., vol. 37, no. 1, pp. 5-16, 2007.
-
(2007)
ACM SIGCOMM Comput. Commun. Rev.
, vol.37
, Issue.1
, pp. 5-16
-
-
Crotti, M.1
Dusi, M.2
Gringoli, F.3
Salgarelli, L.4
-
10
-
-
35348815604
-
Identifying and discriminating between web and peer-to-peer traffic in the network core
-
J. Erman, A. Mahanti, M. Arlitt, and C. Williamson, "Identifying and discriminating between web and peer-to-peer traffic in the network core," in WWW '07, pp. 883-892, 2007.
-
(2007)
WWW '07
, pp. 883-892
-
-
Erman, J.1
Mahanti, A.2
Arlitt, M.3
Williamson, C.4
-
11
-
-
62949129764
-
Extracting hidden anomalies using sketch and non Gaussian multiresolution statistical detection procedures
-
G. Dewaele, K. Fukuda, P. Borgnat, P. Abry, and K. Cho, "Extracting hidden anomalies using sketch and non gaussian multiresolution statistical detection procedures," in ACM SIGCOMM LSAD '07, pp. 145-152, 2007.
-
(2007)
ACM SIGCOMM LSAD '07
, pp. 145-152
-
-
Dewaele, G.1
Fukuda, K.2
Borgnat, P.3
Abry, P.4
Cho, K.5
-
12
-
-
65249141597
-
Unconstrained endpoint profiling (Googling the internet)
-
I. Trestian, S. Ranjan, A. Kuzmanovi, and A. Nucci, "Unconstrained endpoint profiling (Googling the Internet)," in ACM SIGCOMM '08, pp. 279-290, 2008.
-
(2008)
ACM SIGCOMM '08
, pp. 279-290
-
-
Trestian, I.1
Ranjan, S.2
Kuzmanovi, A.3
Nucci, A.4
-
13
-
-
33847303101
-
BLINC: Multilevel traffic classification in the dark
-
T. Karagiannis, K. Papagiannaki, and M. Faloutsos, "BLINC: Multilevel traffic classification in the dark," in ACM SIGCOMM '05, pp. 229-240, 2005.
-
(2005)
ACM SIGCOMM '05
, pp. 229-240
-
-
Karagiannis, T.1
Papagiannaki, K.2
Faloutsos, M.3
-
14
-
-
38049181167
-
Profiling the end host
-
T. Karagiannis, K. Papagiannaki, N. Taft, and M. Faloutsos, "Profiling the end host," in PAM '07, vol. 4427, pp. 186-196, 2007.
-
(2007)
PAM '07
, vol.4427
, pp. 186-196
-
-
Karagiannis, T.1
Papagiannaki, K.2
Taft, N.3
Faloutsos, M.4
-
15
-
-
42149143451
-
Network monitoring using traffic dispersion graphs (TDGs)
-
M. Iliofotou, P. Pappu, M. Faloutsos, M. Mitzenmacher, S. Singh, and G. Varghese, "Network monitoring using traffic dispersion graphs (TDGs)," in ACM IMC '07, pp. 315-320, 2007.
-
(2007)
ACM IMC '07
, pp. 315-320
-
-
Iliofotou, M.1
Pappu, P.2
Faloutsos, M.3
Mitzenmacher, M.4
Singh, S.5
Varghese, G.6
-
16
-
-
76749108118
-
Exploiting dynam-icity in graph-based traffic analysis: Techniques and applications
-
M. Iliofotou, M. Faloutsos, and M. Mitzenmacher, "Exploiting dynam-icity in graph-based traffic analysis: Techniques and applications," in ACM CoNEXT '09, pp. 241-252, 2009.
-
(2009)
ACM CoNEXT '09
, pp. 241-252
-
-
Iliofotou, M.1
Faloutsos, M.2
Mitzenmacher, M.3
-
17
-
-
70449686700
-
Unveiling core network-wide communication patterns through application traffic activity graph decomposition
-
Y. Jin, E. Sharafuddin, and Z.-L. Zhang, "Unveiling core network-wide communication patterns through application traffic activity graph decomposition," in ACM SIGMETRICS '09, pp. 49-60, 2009.
-
(2009)
ACM SIGMETRICS '09
, pp. 49-60
-
-
Jin, Y.1
Sharafuddin, E.2
Zhang, Z.-L.3
-
18
-
-
80052708742
-
Flow signatures of popular applications
-
V. Perelman, N. Melnikov, and J. Schoenwaelder, "Flow signatures of popular applications," in IFIP/IEEE IM 2011, pp. 9-16, 2011.
-
(2011)
IFIP/IEEE im 2011
, pp. 9-16
-
-
Perelman, V.1
Melnikov, N.2
Schoenwaelder, J.3
-
19
-
-
79951601753
-
Profiling-by-association: A resilient traffic profiling solution for the internet backbone
-
ACM
-
M. Iliofotou, B. Gallagher, T. Eliassi-Rad, G. Xie, and M. Faloutsos, "Profiling-by-association: A resilient traffic profiling solution for the Internet backbone," in CoNEXT '10, p. 12, ACM, 2010.
-
(2010)
CoNEXT '10
, pp. 12
-
-
Iliofotou, M.1
Gallagher, B.2
Eliassi-Rad, T.3
Xie, G.4
Faloutsos, M.5
-
20
-
-
76749163352
-
Macro-scope: End-point approach to networked application dependency discovery
-
L. Popa, B.-G. Chun, I. Stoica, J. Chandrashekar, and N. Taft, "Macro-scope: End-point approach to networked application dependency discovery," in ACM CoNEXT '09, pp. 229-240, 2009.
-
(2009)
ACM CoNEXT '09
, pp. 229-240
-
-
Popa, L.1
Chun, B.-G.2
Stoica, I.3
Chandrashekar, J.4
Taft, N.5
-
21
-
-
65249128484
-
What's going on?: Learning communication rules in edge networks
-
S. Kandula, R. Chandra, and D. Katabi, "What's going on?: Learning communication rules in edge networks," in ACM SIGCOMM '08, pp. 87-98, 2008.
-
(2008)
ACM SIGCOMM '08
, pp. 87-98
-
-
Kandula, S.1
Chandra, R.2
Katabi, D.3
-
22
-
-
80054970470
-
Identifying the use of data/voice/video-based P2P traffic by DNS-query behavior
-
H.-S. Wu, N.-F. Huang, and G.-H. Lin, "Identifying the use of data/voice/video-based P2P traffic by DNS-query behavior," in IEEE ICC '09, p. 5, 2009.
-
(2009)
IEEE ICC '09
, pp. 5
-
-
Wu, H.-S.1
Huang, N.-F.2
Lin, G.-H.3
|