메뉴 건너뛰기




Volumn 24, Issue 10, 2013, Pages 2004-2014

Identification of peer-to-peer VoIP sessions using entropy and codec properties

Author keywords

Data communications; distributed applications; network communications; network management; network monitoring; packet switching networks

Indexed keywords

BEHAVIORAL SIGNATURES; DATA-COMMUNICATION; DISTRIBUTED APPLICATIONS; IMPLEMENT MECHANISMS; NETWORK COMMUNICATIONS; NETWORK MONITORING; PEER-TO-PEER COMMUNICATIONS; VOICE OVER INTERNET PROTOCOL;

EID: 84883352782     PISSN: 10459219     EISSN: None     Source Type: Journal    
DOI: 10.1109/TPDS.2012.316     Document Type: Article
Times cited : (11)

References (41)
  • 5
    • 33749995300 scopus 로고    scopus 로고
    • Security challenges for peer-to-peer SIP
    • Set/Oct
    • J. Seedorf, "Security Challenges for Peer-to-Peer SIP," IEEE Network, vol. 20, no. 5, pp. 38-45, Sept./Oct. 2006.
    • (2006) IEEE Network , vol.20 , Issue.5 , pp. 38-45
    • Seedorf, J.1
  • 6
  • 8
    • 33750302284 scopus 로고    scopus 로고
    • Skype security evaluation
    • Anagram Laboratories Oct
    • T. Berson, "Skype Security Evaluation," Technical Report ALR-2005-031, Anagram Laboratories, Oct. 2005.
    • (2005) Technical Report ALR-2005-2031
    • Berson, T.1
  • 9
    • 84883425350 scopus 로고    scopus 로고
    • Security issues and countermeasure for VoIP
    • Information Security Reading Room
    • J. Xin, "Security Issues and Countermeasure for VoIP," White Paper, SANS Inst., Information Security Reading Room, 2007.
    • (2007) White Paper, SANS Inst.
    • Xin, J.1
  • 11
    • 84857641749 scopus 로고    scopus 로고
    • Skype-hunter: A real-time system for the detection and classification of skype traffic
    • D. Adami, C. Callegari, S. Giordano, M. Pagano, and T. Pepe, "Skype-Hunter: A Real-Time System for the Detection and Classification of Skype Traffic," Int'l J. Comm. Systems, vol. 25, pp. 386-403, 2011.
    • (2011) Int'l J. Comm. Systems , vol.25 , pp. 386-403
    • Adami, D.1    Callegari, C.2    Giordano, S.3    Pagano, M.4    Pepe, T.5
  • 14
    • 84861899407 scopus 로고    scopus 로고
    • Exploring behavioral patterns through entropy in multimedia peer-to-peer traffic
    • June
    • J.V. Gomes, P.R.M. Inacio, M. Pereira, M.M. Freire, and P.P. Monteiro, "Exploring Behavioral Patterns through Entropy in Multimedia Peer-to-Peer Traffic," Computer J., vol. 55, no. 6, pp. 740-755, June 2012.
    • (2012) Computer J , vol.55 , Issue.6 , pp. 740-755
    • Gomes, J.V.1    Inacio, P.R.M.2    Pereira, M.3    Freire, M.M.4    Monteiro, P.P.5
  • 15
    • 79751526491 scopus 로고    scopus 로고
    • A VoIP traffic identification scheme based on host and flow behavior analysis
    • Mar
    • B. Li, M. Ma, and Z. Jin, "A VoIP Traffic Identification Scheme Based on Host and Flow Behavior Analysis," J. Network Systems Management, vol. 19, no. 1, pp. 111-129, Mar. 2011.
    • (2011) J. Network Systems Management , vol.19 , Issue.1 , pp. 111-129
    • Li, B.1    Ma, M.2    Jin, Z.3
  • 23
    • 50949110026 scopus 로고    scopus 로고
    • Detection and comparison of RTP and skype traffic and performance
    • Dec
    • J.-L. Costeux, F. Guyard, and A.-M. Bustos, "Detection and Comparison of RTP and Skype Traffic and Performance," Proc. IEEE GLOBECOM, pp. 1-5, Dec. 2006.
    • (2006) Proc. IEEE GLOBECOM , pp. 1-5
    • Costeux, J.-L.1    Guyard, F.2    Bustos, A.-M.3
  • 25
    • 78650624618 scopus 로고    scopus 로고
    • On the identification and analysis of skype traffic
    • Jan
    • S. Molnar and M. Perenyi, "On the Identification and Analysis of Skype Traffic," Int'l J. Comm. Systems, vol. 24, no. 1, pp. 94-117, Jan. 2011.
    • (2011) Int'l J. Comm. Systems , vol.24 , Issue.1 , pp. 94-117
    • Molnar, S.1    Perenyi, M.2
  • 34
    • 77957281650 scopus 로고    scopus 로고
    • Statistical analysis and modeling of skype VoIP flows
    • Nov
    • N.M. Markovich and U.R. Krieger, "Statistical Analysis and Modeling of Skype VoIP Flows," Computer Comm., vol. 33, no. S1, pp. S11-S21, Nov. 2010.
    • (2010) Computer Comm , vol.33 , Issue.S1
    • Markovich, N.M.1    Krieger, U.R.2
  • 38
    • 0029392293 scopus 로고
    • A parameterizable methodology for internet traffic flow profiling
    • Oct
    • K.C. Claffy, H.-W. Braun, and G.C. Polyzos, "A Parameterizable Methodology for Internet Traffic Flow Profiling," IEEE J. Selected Areas Comm., vol. 13, no. 8, pp. 1481-1494, Oct. 1995.
    • (1995) IEEE J. Selected Areas Comm , vol.13 , Issue.8 , pp. 1481-1494
    • Claffy, K.C.1    Braun, H.-W.2    Polyzos, G.C.3
  • 39
    • 84883426507 scopus 로고    scopus 로고
    • L7-Filter Application Layer Packet Classifier for Linux
    • L7-Filter, Application Layer Packet Classifier for Linux, http://l7-filter.sourceforge.net, 2013.
    • (2013)
  • 40
    • 84883372032 scopus 로고    scopus 로고
    • Tools for L2-L7 Traffic Classification
    • Tools for L2-L7 Traffic Classification, http://netgroup.polito.it/ research-projects/l7-traffic-classification/, 2013.
    • (2013)
  • 41
    • 84883330902 scopus 로고    scopus 로고
    • Tstat: TCP Statistic and Analysis Tool
    • Tstat: TCP Statistic and Analysis Tool, http://tstat.tlc.polito.it, 2013.
    • (2013)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.