메뉴 건너뛰기




Volumn , Issue , 2014, Pages 218-227

No NAT'd user left behind: Fingerprinting users behind NAT from NetFlow records alone

Author keywords

[No Author keywords available]

Indexed keywords

WI-FI;

EID: 84907726670     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICDCS.2014.30     Document Type: Conference Paper
Times cited : (42)

References (41)
  • 22
    • 84907804902 scopus 로고    scopus 로고
    • The Washington Post 5 December 2013. Available [Last accessed: 6 December 2013]
    • M. Ehrenfreund. NSA tracking phone locations on planetary scale. The Washington Post, 5 December 2013. Available: http://www.washingtonpost.com/world/national-security/nsa-tracking-phone-locations-on-planetary-scale/2013/12/05/dfe21740-5db2-11e3-bc56-c6ca94801fac story.html [Last accessed: 6 December 2013], 2013.
    • (2013) NSA Tracking Phone Locations on Planetary Scale
    • Ehrenfreund, M.1
  • 23
    • 60949108379 scopus 로고    scopus 로고
    • Passive network forensics: Behavioural classification of network hosts based on connection patterns
    • Apr.
    • J. McHugh, R. McLeod, and V. Nagaonkar. Passive network forensics: Behavioural classification of network hosts based on connection patterns. SIGOPS Oper. Syst. Rev., 42(3):99-111, Apr. 2008.
    • (2008) SIGOPS Oper. Syst. Rev. , vol.42 , Issue.3 , pp. 99-111
    • McHugh, J.1    McLeod, R.2    Nagaonkar, V.3
  • 25
    • 85042755349 scopus 로고    scopus 로고
    • Timely and continuous machine-learning-based classification for interactive ip traffic
    • Dec.
    • T. T. T. Nguyen, G. Armitage, P. Branch, and S. Zander. Timely and continuous machine-learning-based classification for interactive ip traffic. IEEE/ACM Trans. Netw., 20(6):1880-1894, Dec. 2012.
    • (2012) IEEE/ACM Trans. Netw. , vol.20 , Issue.6 , pp. 1880-1894
    • Nguyen, T.T.T.1    Armitage, G.2    Branch, P.3    Zander, S.4
  • 27
    • 84870637005 scopus 로고    scopus 로고
    • Flowscan: A network traffic flow reporting and visualization tool
    • Berkeley, CA, USA USENIX Association
    • D. Plonka. Flowscan: A network traffic flow reporting and visualization tool. In Proceedings of the 14th USENIX conference on System administration, LISA '00, pages 305-318, Berkeley, CA, USA, 2000. USENIX Association.
    • (2000) Proceedings of the 14th USENIX Conference on System Administration, LISA '00 , pp. 305-318
    • Plonka, D.1
  • 28
    • 84907748495 scopus 로고    scopus 로고
    • The Verge 4 December 2013. Available [Last accessed: 6 December 2013]
    • R. Brandom. The NSA tracks the location of hundreds of millions of phones. The Verge, 4 December 2013. Available: http://www.theverge.com/2013/12/4/5175778/the-nsa-tracks-the-location-of-hundreds-of-millions-of-phones [Last accessed: 6 December 2013], 2013.
    • (2013) The NSA Tracks the Location of Hundreds of Millions of Phones
    • Brandom, R.1
  • 29
    • 0024610919 scopus 로고
    • A tutorial on hidden markov models and selected applications in speech recognition
    • L. R. Rabiner. A tutorial on hidden markov models and selected applications in speech recognition. Proceedings of the IEEE, 77(2):257-286, 1989.
    • (1989) Proceedings of the IEEE , vol.77 , Issue.2 , pp. 257-286
    • Rabiner, L.R.1
  • 38
    • 85008008496 scopus 로고    scopus 로고
    • Internet traffic behavior profiling for network
    • K. Xu, Z.-J. Zhang, and S. Bhattacharyya. Internet Traffic Behavior Profiling for Network. IEEE/ACM Trans. Netw., 16(6):1241-1252, 2008.
    • (2008) IEEE/ACM Trans. Netw. , vol.16 , Issue.6 , pp. 1241-1252
    • Xu, K.1    Zhang, Z.-J.2    Bhattacharyya, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.