Accesso libero

P2P Traffic Identification Based on Host and Flow Behaviour Characteristics

INFORMAZIONI SU QUESTO ARTICOLO

Cita

1. Mac Manus, R. Trend Watch: P2P Traffic Much Bigger than Web Traffic, 2006. http://www.readwriteweb.com/archives/p2p_growth_trend_watch.phpSearch in Google Scholar

2. Moore, A., D. Zuev. Internet Traffic Classification Using Bayesian Analysis Techniques. - In: Proceedings of 26th ACM International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS 2005, 2005, 50-59.10.1145/1064212.1064220Search in Google Scholar

3. Sen, S., O. Spatscheck, D. Wang Accurate. Scalable in-Network Identification of P2P Traffic Using Application Signatures. - In: Proceedings of 13th World Wide Web Conference 2004, 512-520.10.1145/988672.988742Search in Google Scholar

4. Nguyen, T. T., G. Armitage. A Survey of Techniques for Internet Traffic Classification Using Machine Learning. - IEEE Communications Surveys and Tutorials, Vol. 10, 2008, No 4, 56- 76.10.1109/SURV.2008.080406Search in Google Scholar

5. Crotti, M., M. Dusi, F. Gringoli, L. Salgarelli. Traffic Classification through Simple Statistical Fingerprinting. - ACM SIGCOMM Computer Communication Review, Vol. 37, 2007, No 1, 7-16.10.1145/1198255.1198257Search in Google Scholar

6. Bernaille, L., R. Teixeira, K. Salamatian. Traffic Classification on the Fly. - ACM SIGCOMM Computer Communication Review,Vol. 36, 2006, No 2, 23-26.10.1145/1129582.1129589Search in Google Scholar

7. Chen, M., X. Wei. Hidden Markov Model-Based P2P Flow Identification: A Hidden Markov Model-Based P2P Flow Identification Method. - IET Communications, Vol. 6, 2012, No 13, 2091-2098.10.1049/iet-com.2010.1091Search in Google Scholar

8. Karagiannis, T., K. Papagiannaki, M. Faloutsos. BLINC: Multilevel Traffic Classification in the Dark. - In: Proceedings of the ACM SIGCOMM 2005 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, 2005, 229-237. 9 . Collins, M., M. Reiter. Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviours. - In: Proceedings of 11th European Symposium on Research in Computer Security, ESORICS 2006, 1-17.10.1145/1080091.1080119Search in Google Scholar

10. Hu , Yan, Dah-Ming Chiu, John C. S. Lui. Profiling and Identification of P2P Traffic. - Computer Networks, Vol. 53, 2009, No 6, 849-863.10.1016/j.comnet.2008.11.005Search in Google Scholar

11. Perenyi, M., D. Trang Dinh, A. Gefferth, S. Molnar. Identification and Analysis of Peer-to-Peer Traffic. - Journal of Communications, Vol. 1, 2006, No 7, 36-46.10.4304/jcm.1.7.36-46Search in Google Scholar

12. Bermolen, P., M. Mellia, M. Meo, D. Rossi, S. Valenti. Abacus: Accurate Behavioural Classification of P2P-TV Traffic. - Computer Networks, Vol. 55, 2011, No 6, 1394-1411.10.1016/j.comnet.2010.12.004Search in Google Scholar

13. Yang, Jie, Lun Yuan, Yang He, Lu-ying Chen. Timely Traffic Identification on P2P Streaming Media. - Journal of China Universities of Posts and Telecommunications, Vol. 19, 2012, No 2, 67-73.10.1016/S1005-8885(11)60247-1Search in Google Scholar

14. Xu, Ke, Ming Zhang, Mingjiang Ye, Dah Ming Chiu, Jianping Wu. Identify P2P Traffic by Inspecting Data Transfer Behaviour. - Computer Communications, Vol. 33, 2010, No 10, 1141-1150.10.1016/j.comcom.2010.01.005Search in Google Scholar

15. Unibs Dataset. http://www.ing.unibs.it/ntw/tools/traces/ Search in Google Scholar

eISSN:
1314-4081
ISSN:
1311-9702
Lingua:
Inglese
Frequenza di pubblicazione:
4 volte all'anno
Argomenti della rivista:
Computer Sciences, Information Technology