On Metrics to Distinguish Skype flows from HTTP traffic
暂无分享,去创建一个
[1] Renata Teixeira,et al. Traffic classification on the fly , 2006, CCRV.
[2] Michalis Faloutsos,et al. Is P2P dying or just hiding? [P2P traffic measurement] , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..
[3] Dario Rossi,et al. Tracking Down Skype Traffic , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[4] W. G. Cochran. The $\chi^2$ Test of Goodness of Fit , 1952 .
[5] Carey Williamson,et al. A Synthetic Workload Model for Internet Mosaic Traffic , 1995 .
[6] Bengt Ahlgren,et al. Using empirical distributions to characterize Web client traffic and to generate synthetic traffic , 2000, Globecom '00 - IEEE. Global Telecommunications Conference. Conference Record (Cat. No.00CH37137).
[7] Hyoung-Kee Choi,et al. A behavioral model of Web traffic , 1999, Proceedings. Seventh International Conference on Network Protocols.
[8] Stefan Savage,et al. Unexpected means of protocol inference , 2006, IMC '06.
[9] Qiang Chen,et al. Probabilistic techniques for intrusion detection based on computer audit data , 2001, IEEE Trans. Syst. Man Cybern. Part A.
[10] Walter Willinger,et al. On the self-similar nature of Ethernet traffic , 1993, SIGCOMM '93.
[11] Marco Mellia,et al. Revealing skype traffic: when randomness plays with you , 2007, SIGCOMM 2007.
[12] Michalis Faloutsos,et al. BLINC: multilevel traffic classification in the dark , 2005, SIGCOMM '05.
[13] Azer Bestavros,et al. Self-similarity in World Wide Web traffic: evidence and possible causes , 1997, TNET.
[14] Bruce A. Mah,et al. An empirical model of HTTP network traffic , 1997, Proceedings of INFOCOM '97.
[15] F. Massey. The Kolmogorov-Smirnov Test for Goodness of Fit , 1951 .
[16] Konstantina Papagiannaki,et al. Toward the Accurate Identification of Network Applications , 2005, PAM.
[17] Christopher Krügel,et al. A multi-model approach to the detection of web-based attacks , 2005, Comput. Networks.
[18] D. Darling,et al. A Test of Goodness of Fit , 1954 .
[19] Sven Ehlert,et al. Analysis and Signature of Skype VoIP Session Traffic , 2006 .
[20] Mark Crovella,et al. Characteristics of WWW Client-based Traces , 1995 .
[21] Ravi Jain,et al. An Experimental Study of the Skype Peer-to-Peer VoIP System , 2005, IPTPS.
[22] Bruce M. Maggs,et al. An analysis of live streaming workloads on the internet , 2004, IMC '04.
[23] Henning Schulzrinne,et al. An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol , 2004, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[24] Roy T. Fielding,et al. Hypertext Transfer Protocol - HTTP/1.0 , 1996, RFC.
[25] Juan E. Tapiador,et al. Measuring normality in HTTP traffic for anomaly-based intrusion detection , 2004, Comput. Networks.
[26] Chase Cotton,et al. Packet-level traffic measurements from the Sprint IP backbone , 2003, IEEE Netw..
[27] Roy T. Fielding,et al. Hypertext Transfer Protocol - HTTP/1.1 , 1997, RFC.
[28] Paul Barford,et al. Generating representative Web workloads for network and server performance evaluation , 1998, SIGMETRICS '98/PERFORMANCE '98.
[29] Ronaldo M. Salles,et al. Detecting Skype flows in Web traffic , 2008, NOMS 2008 - 2008 IEEE Network Operations and Management Symposium.