메뉴 건너뛰기




Volumn , Issue , 2007, Pages 401-406

Network forensic on encrypted peer-to-peer VoIP traffics and the detection, blocking, and prioritization of skype traffics

Author keywords

Blocking; Enterprise network security; NAT traversal; Network forensics; Reverse engineering; Skype; Traffic analysis; Traffic prioritization

Indexed keywords

COMPUTER SYSTEM FIREWALLS; COMPUTER VIRUSES; CRYPTOGRAPHY; DIGITAL FORENSICS; DISTRIBUTED COMPUTER SYSTEMS; FORENSIC ENGINEERING; INTERNET TELEPHONY; NETWORK SECURITY; REVERSE ENGINEERING; VOICE/DATA COMMUNICATION SYSTEMS;

EID: 85042609222     PISSN: 15244547     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WETICE.2007.4407198     Document Type: Conference Paper
Times cited : (11)

References (16)
  • 1
    • 22344449516 scopus 로고    scopus 로고
    • An analysis of the skype peer-to-peer internet telephony protocol
    • CUCS-039-04, Sept
    • S. A. Baset and H. Schulzrinne. An analysis of the skype peer-to-peer internet telephony protocol. In Columbia University Technical Report CUCS-039-04, Sept. 2004.
    • (2004) Columbia University Technical Report
    • Baset, S.A.1    Schulzrinne, H.2
  • 2
    • 33750309882 scopus 로고    scopus 로고
    • An analysis of the skype peer-to-peer internet telephony protocol
    • Apr
    • S. A. Baset and H. Schulzrinne. An analysis of the skype peer-to-peer internet telephony protocol. In IEEE INFOCOM' 06, Apr. 2006.
    • (2006) IEEE INFOCOM' 06
    • Baset, S.A.1    Schulzrinne, H.2
  • 4
    • 70449577353 scopus 로고    scopus 로고
    • Open source voip traffic monitoring
    • May
    • L. Deri. Open source voip traffic monitoring. In SANE 2006, May 2006.
    • (2006) SANE 2006
    • Deri, L.1
  • 5
    • 85019224720 scopus 로고    scopus 로고
    • B. F. et. al. Peer-to-peer communication across network address translators. In USENIX, pages 179-192, 2005.
    • B. F. et. al. Peer-to-peer communication across network address translators. In USENIX, pages 179-192, 2005.
  • 8
  • 10
    • 39349117411 scopus 로고    scopus 로고
    • Analysis and evaluation of the skype and google-talk voip systems
    • B. Sat and B. W. Wah. Analysis and evaluation of the skype and google-talk voip systems. In IEEE ICME., 2006.
    • (2006) IEEE ICME
    • Sat, B.1    Wah, B.W.2
  • 12
    • 34547335916 scopus 로고    scopus 로고
    • Characterizing and detecting relayed traffic: A case study using skype
    • Apr
    • K. Suh, D. R. Figueiredo, J. Kurose, and D. Towsley. Characterizing and detecting relayed traffic: A case study using skype. In IEEE INFOCOM'06, Apr. 2006.
    • (2006) IEEE INFOCOM'06
    • Suh, K.1    Figueiredo, D.R.2    Kurose, J.3    Towsley, D.4
  • 13
    • 0034593179 scopus 로고    scopus 로고
    • A requires/provides model for computer attacks
    • S. Templeton and K. Levitt. A requires/provides model for computer attacks. In NSPW, 2000.
    • (2000) NSPW
    • Templeton, S.1    Levitt, K.2
  • 14
    • 0037244227 scopus 로고    scopus 로고
    • C. I. et. al. A comparative experimental evaluation study of intrusion detection system performance in a gigabit environment. Journal of Computer Security, 11(1):1-33, 2003.
    • C. I. et. al. A comparative experimental evaluation study of intrusion detection system performance in a gigabit environment. Journal of Computer Security, 11(1):1-33, 2003.
  • 15
    • 33745773302 scopus 로고    scopus 로고
    • Tracking anonymous peer-to-peer voip calls on the internet
    • X. Wang, S. Chen, and S. Jajodia. Tracking anonymous peer-to-peer voip calls on the internet. In ACM CCS, pages 81-91, 2005.
    • (2005) ACM CCS , pp. 81-91
    • Wang, X.1    Chen, S.2    Jajodia, S.3
  • 16
    • 38949175425 scopus 로고    scopus 로고
    • Traffic identification and overlay measurement of skype
    • Nov
    • Y. Yu, D. Liu, J. Li, and C. Shen. Traffic identification and overlay measurement of skype. In ICCIS, pages 1043-1048, Nov. 2006.
    • (2006) ICCIS , pp. 1043-1048
    • Yu, Y.1    Liu, D.2    Li, J.3    Shen, C.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.