-
1
-
-
39049168726
-
Characterizing and detecting skype-relayed traffic
-
Apr
-
K. Suh, D.R. Figueiredo, J. Kurose, and D. Towsley, "Characterizing and Detecting Skype-Relayed Traffic," Proc. 25th IEEE INFOCOM, pp. 1-12, Apr. 2006.
-
(2006)
Proc. 25th IEEE INFOCOM
, pp. 1-12
-
-
Suh, K.1
Figueiredo, D.R.2
Kurose, J.3
Towsley, D.4
-
2
-
-
67449104703
-
Detecting VoIP calls hidden in web traffic
-
Dec
-
E.P. Freire, A. Ziviani, and R.M. Salles, "Detecting VoIP Calls Hidden in Web Traffic," IEEE Trans. Network Service Management, vol. 5, no. 4, pp. 204-214, Dec. 2008.
-
(2008)
IEEE Trans. Network Service Management
, vol.5
, Issue.4
, pp. 204-214
-
-
Freire, E.P.1
Ziviani, A.2
Salles, R.M.3
-
3
-
-
84879202939
-
Detailed analysis of skype traffic
-
Jan
-
D. Bonfiglio, M. Mellia, M. Meo, and D. Rossi, "Detailed Analysis of Skype Traffic," IEEE Trans. Multimedia, vol. 11, no. 1, pp. 117-127, Jan. 2009.
-
(2009)
IEEE Trans. Multimedia
, vol.11
, Issue.1
, pp. 117-127
-
-
Bonfiglio, D.1
Mellia, M.2
Meo, M.3
Rossi, D.4
-
5
-
-
33749995300
-
Security challenges for peer-to-peer SIP
-
Set/Oct
-
J. Seedorf, "Security Challenges for Peer-to-Peer SIP," IEEE Network, vol. 20, no. 5, pp. 38-45, Sept./Oct. 2006.
-
(2006)
IEEE Network
, vol.20
, Issue.5
, pp. 38-45
-
-
Seedorf, J.1
-
6
-
-
71549142981
-
Issues and challenges in securing VoIP
-
Nov
-
R. Dantu, S. Fahmy, H. Schulzrinne, and J. Cangussu, "Issues and Challenges in Securing VoIP," Computers Security, vol. 28, no. 8, pp. 743-753, Nov. 2009.
-
(2009)
Computers Security
, vol.28
, Issue.8
, pp. 743-753
-
-
Dantu, R.1
Fahmy, S.2
Schulzrinne, H.3
Cangussu, J.4
-
7
-
-
33646927326
-
Security considerations for voice over IP systems
-
Gaithersburg, MA Jan
-
D.R. Kuhn, T.J. Walsh, and S. Fries, "Security Considerations for Voice over IP Systems," Technical Report 800-58, Nat'l Inst. of Standards and Technology, Gaithersburg, MA, Jan. 2005.
-
(2005)
Technical Report 800-858, Nat'l Inst of Standards and Technology
-
-
Kuhn, D.R.1
Walsh, T.J.2
Fries, S.3
-
8
-
-
33750302284
-
Skype security evaluation
-
Anagram Laboratories Oct
-
T. Berson, "Skype Security Evaluation," Technical Report ALR-2005-031, Anagram Laboratories, Oct. 2005.
-
(2005)
Technical Report ALR-2005-2031
-
-
Berson, T.1
-
9
-
-
84883425350
-
Security issues and countermeasure for VoIP
-
Information Security Reading Room
-
J. Xin, "Security Issues and Countermeasure for VoIP," White Paper, SANS Inst., Information Security Reading Room, 2007.
-
(2007)
White Paper, SANS Inst.
-
-
Xin, J.1
-
10
-
-
36949009834
-
Revealing skype traffic: When randomness plays with you
-
Oct
-
D. Bonfiglio, M. Mellia, M. Meo, D. Rossi, and P. Tofanelli, "Revealing Skype Traffic: When Randomness Plays with You," ACM SIGCOMM Computer Comm. Rev., vol. 37, no. 4, pp. 37-48, Oct. 2007.
-
(2007)
ACM SIGCOMM Computer Comm. Rev
, vol.37
, Issue.4
, pp. 37-48
-
-
Bonfiglio, D.1
Mellia, M.2
Meo, M.3
Rossi, D.4
Tofanelli, P.5
-
11
-
-
84857641749
-
Skype-hunter: A real-time system for the detection and classification of skype traffic
-
D. Adami, C. Callegari, S. Giordano, M. Pagano, and T. Pepe, "Skype-Hunter: A Real-Time System for the Detection and Classification of Skype Traffic," Int'l J. Comm. Systems, vol. 25, pp. 386-403, 2011.
-
(2011)
Int'l J. Comm. Systems
, vol.25
, pp. 386-403
-
-
Adami, D.1
Callegari, C.2
Giordano, S.3
Pagano, M.4
Pepe, T.5
-
13
-
-
62849112800
-
Analysis of peer-to-peer traffic using a behavioural method based on entropy
-
Dec
-
J.V.P. Gomes, P.R.M. Inacio, M.M. Freire, M. Pereira, and P.P. Monteiro, "Analysis of Peer-to-Peer Traffic Using a Behavioural Method Based on Entropy," Proc. 27th IEEE Int'l Performance Computing and Comm. Conf. (IPCCC '08), pp. 201-208, Dec. 2008.
-
(2008)
Proc. 27th IEEE Int'l Performance Computing and Comm. Conf. (IPCCC '08)
, pp. 201-208
-
-
Gomes, J.V.P.1
Inacio, P.R.M.2
Freire, M.M.3
Pereira, M.4
Monteiro, P.P.5
-
14
-
-
84861899407
-
Exploring behavioral patterns through entropy in multimedia peer-to-peer traffic
-
June
-
J.V. Gomes, P.R.M. Inacio, M. Pereira, M.M. Freire, and P.P. Monteiro, "Exploring Behavioral Patterns through Entropy in Multimedia Peer-to-Peer Traffic," Computer J., vol. 55, no. 6, pp. 740-755, June 2012.
-
(2012)
Computer J
, vol.55
, Issue.6
, pp. 740-755
-
-
Gomes, J.V.1
Inacio, P.R.M.2
Pereira, M.3
Freire, M.M.4
Monteiro, P.P.5
-
15
-
-
79751526491
-
A VoIP traffic identification scheme based on host and flow behavior analysis
-
Mar
-
B. Li, M. Ma, and Z. Jin, "A VoIP Traffic Identification Scheme Based on Host and Flow Behavior Analysis," J. Network Systems Management, vol. 19, no. 1, pp. 111-129, Mar. 2011.
-
(2011)
J. Network Systems Management
, vol.19
, Issue.1
, pp. 111-129
-
-
Li, B.1
Ma, M.2
Jin, Z.3
-
16
-
-
38949175425
-
Traffic identification and overlay measurement of skype
-
Nov
-
Y. Yu, D. Liu, J. Li, and C. Shen, "Traffic Identification and Overlay Measurement of Skype," Proc. Int'l Conf. Computational Intelligence and Security, pp. 1043-1048, Nov. 2006.
-
(2006)
Proc. Int'l Conf. Computational Intelligence and Security
, pp. 1043-1048
-
-
Yu, Y.1
Liu, D.2
Li, J.3
Shen, C.4
-
17
-
-
34748815708
-
Analysis and signature of skype voip session traffic
-
Berlin, Germany July
-
S. Ehlert and S. Petgang, "Analysis and Signature of Skype VoIP Session Traffic," Technical Report NGNI-SKYPE-06b, Fraunhofer FOKUS, Berlin, Germany, July 2006.
-
(2006)
Technical Report NGNI-SKYPE-06b, Fraunhofer FOKUS
-
-
Ehlert, S.1
Petgang, S.2
-
18
-
-
67650330581
-
Detection and tracking of skype by exploiting cross layer information in a live 3G network
-
May
-
P. Svoboda, E. Hyytia, F. Ricciato, M. Rupp, and M. Karner, "Detection and Tracking of Skype by Exploiting Cross Layer Information in a Live 3G Network," Proc. First Int'l Workshop Traffic Monitoring and Analysis (TMA '09), pp. 93-100, May 2009.
-
(2009)
Proc. First Int'l Workshop Traffic Monitoring and Analysis (TMA '09)
, pp. 93-100
-
-
Svoboda, P.1
Hyytia, E.2
Ricciato, F.3
Rupp, M.4
Karner, M.5
-
19
-
-
79952214542
-
Research on the characteristics and blocking realization of skype protocol
-
June
-
F. Lu, X.-L. Liu, and Z.-N. Ma, "Research on the Characteristics and Blocking Realization of Skype Protocol," Proc. Int'l Conf. Electrical and Control Eng. (ICECE '10), pp. 2964-2967, June 2010.
-
(2010)
Proc. Int'l Conf. Electrical and Control Eng. (ICECE '10)
, pp. 2964-2967
-
-
Lu, F.1
Liu, X.-L.2
Ma, Z.-N.3
-
20
-
-
77954464996
-
Identification and analysis of skype peer-to-peer traffic
-
May
-
D. Zhang, C. Zheng, H. Zhang, and H. Yu, "Identification and Analysis of Skype Peer-to-Peer Traffic," Proc. Fifth Int'l Conf. Internet and Web Applications and Services (ICIW '10), pp. 200-206, May 2010.
-
(2010)
Proc. Fifth Int'l Conf. Internet and Web Applications and Services (ICIW '10)
, pp. 200-206
-
-
Zhang, D.1
Zheng, C.2
Zhang, H.3
Yu, H.4
-
22
-
-
77955128766
-
Entropy-based traffic filtering to support real-time skype detection
-
June/July
-
P. Dorfinger, G. Panholzer, B. Trammell, and T. Pepe, "Entropy-Based Traffic Filtering to Support Real-Time Skype Detection," Proc. Sixth Int'l Wireless Comm. and Mobile Computing Conf. (IWCMC '10), pp. 747-751, June/July 2010.
-
(2010)
Proc. Sixth Int'l Wireless Comm. and Mobile Computing Conf. (IWCMC '10)
, pp. 747-751
-
-
Dorfinger, P.1
Panholzer, G.2
Trammell, B.3
Pepe, T.4
-
23
-
-
50949110026
-
Detection and comparison of RTP and skype traffic and performance
-
Dec
-
J.-L. Costeux, F. Guyard, and A.-M. Bustos, "Detection and Comparison of RTP and Skype Traffic and Performance," Proc. IEEE GLOBECOM, pp. 1-5, Dec. 2006.
-
(2006)
Proc. IEEE GLOBECOM
, pp. 1-5
-
-
Costeux, J.-L.1
Guyard, F.2
Bustos, A.-M.3
-
24
-
-
58049089052
-
Transport layer identification of skype traffic
-
Jan
-
L. Lu, J. Horton, R. Safavi-Naini, and W. Susilo, "Transport Layer Identification of Skype Traffic," Proc. Int'l Conf. Information Networking (ICOIN '07), pp. 465-481, Jan. 2007.
-
(2007)
Proc. Int'l Conf. Information Networking (ICOIN '07)
, pp. 465-481
-
-
Lu, L.1
Horton, J.2
Safavi-Naini, R.3
Susilo, W.4
-
25
-
-
78650624618
-
On the identification and analysis of skype traffic
-
Jan
-
S. Molnar and M. Perenyi, "On the Identification and Analysis of Skype Traffic," Int'l J. Comm. Systems, vol. 24, no. 1, pp. 94-117, Jan. 2011.
-
(2011)
Int'l J. Comm. Systems
, vol.24
, Issue.1
, pp. 94-117
-
-
Molnar, S.1
Perenyi, M.2
-
27
-
-
38049037283
-
Identifying skype traffic by random forest
-
Sept
-
L. Jun, Z. Shunyi, X. Ye, and S. Yanfei, "Identifying Skype Traffic by Random Forest," Proc. Int'l Conf. Wireless Comm., Networking and Mobile Computing (WiCom '07), pp. 2841-2844, Sept. 2007.
-
(2007)
Proc. Int'l Conf. Wireless Comm., Networking and Mobile Computing (WiCom '07)
, pp. 2841-2844
-
-
Jun, L.1
Shunyi, Z.2
Ye, X.3
Yanfei, S.4
-
28
-
-
70450239617
-
Rapid identification of skype traffic flows
-
June
-
P.A. Branch, A. Heyde, and G.J. Armitage, "Rapid Identification of Skype Traffic Flows," Proc. 18th Int'l Workshop Network and Operating System Support for Digital Audio and Video (NOSSDAV '09), pp. 91-96, June 2009.
-
(2009)
Proc. 18th Int'l Workshop Network and Operating System Support for Digital Audio and Video (NOSSDAV '09)
, pp. 91-96
-
-
Branch, P.A.1
Heyde, A.2
Armitage, G.J.3
-
30
-
-
57349087202
-
Detecting VoIP traffic based on human conversation patterns
-
July
-
C.-C. Wu, K.-T. Chen, Y.-C. Chang, and C.-L. Lei, "Detecting VoIP Traffic Based on Human Conversation Patterns," Proc. Int'l Conf. Principles, Systems and Applications of IP Telecomm. (IPTComm '08), pp. 280-295, July 2008.
-
(2008)
Proc. Int'l Conf. Principles, Systems and Applications of IP Telecomm. (IPTComm '08)
, pp. 280-295
-
-
Wu, C.-C.1
Chen, K.-T.2
Chang, Y.-C.3
Lei, C.-L.4
-
31
-
-
78650461710
-
Skype traffic identification based SVM using optimized feature set
-
Oct
-
H. Zhang, Z. Gu, and Z. Tian, "Skype Traffic Identification Based SVM Using Optimized Feature Set," Proc. Int'l Conf. Information, Networking and Automation (ICINA '10), vol. 2, pp. 431-435, Oct. 2010.
-
(2010)
Proc. Int'l Conf. Information, Networking and Automation (ICINA '10)
, vol.2
, pp. 431-435
-
-
Zhang, H.1
Gu, Z.2
Tian, Z.3
-
33
-
-
73149113565
-
A network traffic identification method based on finite state machine
-
Sept
-
B. Xu, M. Chen, C. Xing, and G. Zhang, "A Network Traffic Identification Method Based on Finite State Machine," Proc. Fifth Int'l Conf. Wireless Comm., Networking and Mobile Computing (WiCom '09), pp. 1-4, Sept. 2009.
-
(2009)
Proc. Fifth Int'l Conf. Wireless Comm., Networking and Mobile Computing (WiCom '09)
, pp. 1-4
-
-
Xu, B.1
Chen, M.2
Xing, C.3
Zhang, G.4
-
34
-
-
77957281650
-
Statistical analysis and modeling of skype VoIP flows
-
Nov
-
N.M. Markovich and U.R. Krieger, "Statistical Analysis and Modeling of Skype VoIP Flows," Computer Comm., vol. 33, no. S1, pp. S11-S21, Nov. 2010.
-
(2010)
Computer Comm
, vol.33
, Issue.S1
-
-
Markovich, N.M.1
Krieger, U.R.2
-
35
-
-
33751065679
-
Statistical traffic identification method based on flow-level behavior for fair VoIP service
-
Apr
-
T. Okabe, T. Kitamura, and T. Shizuno, "Statistical Traffic Identification Method Based on Flow-Level Behavior for Fair VoIP Service," Proc. First IEEE Workshop VoIP Management and Security (VoIP MaSe '06), pp. 35-40, Apr. 2006.
-
(2006)
Proc. First IEEE Workshop VoIP Management and Security (VoIP MaSe '06)
, pp. 35-40
-
-
Okabe, T.1
Kitamura, T.2
Shizuno, T.3
-
36
-
-
71049178877
-
P2P applications identification based on the statistics analysis of packet length
-
May
-
F. Liu, Z. Li, and J. Yu, "P2P Applications Identification Based on the Statistics Analysis of Packet Length," Proc. Int'l Symp. Information Eng. and Electronic Commerce (IEEC '09), pp. 160-163, May 2009.
-
(2009)
Proc. Int'l Symp. Information Eng. and Electronic Commerce (IEEC '09)
, pp. 160-163
-
-
Liu, F.1
Li, Z.2
Yu, J.3
-
37
-
-
50249140706
-
Spot me if you can: Uncovering spoken phrases in encrypted Voip conversations
-
May
-
C.V. Wright, L. Ballard, S.E. Coull, F. Monrose, and G.M. Masson, "Spot Me If You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations," Proc. IEEE Symp. Security and Privacy (SP '08), pp. 35-49, May 2008.
-
(2008)
Proc. IEEE Symp. Security and Privacy (SP '08)
, pp. 35-49
-
-
Wright, C.V.1
Ballard, L.2
Coull, S.E.3
Monrose, F.4
Masson, G.M.5
-
38
-
-
0029392293
-
A parameterizable methodology for internet traffic flow profiling
-
Oct
-
K.C. Claffy, H.-W. Braun, and G.C. Polyzos, "A Parameterizable Methodology for Internet Traffic Flow Profiling," IEEE J. Selected Areas Comm., vol. 13, no. 8, pp. 1481-1494, Oct. 1995.
-
(1995)
IEEE J. Selected Areas Comm
, vol.13
, Issue.8
, pp. 1481-1494
-
-
Claffy, K.C.1
Braun, H.-W.2
Polyzos, G.C.3
-
39
-
-
84883426507
-
-
L7-Filter Application Layer Packet Classifier for Linux
-
L7-Filter, Application Layer Packet Classifier for Linux, http://l7-filter.sourceforge.net, 2013.
-
(2013)
-
-
-
40
-
-
84883372032
-
-
Tools for L2-L7 Traffic Classification
-
Tools for L2-L7 Traffic Classification, http://netgroup.polito.it/ research-projects/l7-traffic-classification/, 2013.
-
(2013)
-
-
-
41
-
-
84883330902
-
-
Tstat: TCP Statistic and Analysis Tool
-
Tstat: TCP Statistic and Analysis Tool, http://tstat.tlc.polito.it, 2013.
-
(2013)
-
-
|