Understanding passive and active service discovery
暂无分享,去创建一个
John S. Heidemann | Christos Papadopoulos | Genevieve Bartlett | C. Papadopoulos | J. Heidemann | G. Bartlett
[1] Sun Microsystems,et al. RPC: Remote Procedure Call Protocol specification: Version 2 , 1988, RFC.
[2] Hector Garcia-Molina,et al. Transience of peers & streaming media , 2003, CCRV.
[3] Krishna P. Gummadi,et al. Measurement, modeling, and analysis of a peer-to-peer file-sharing workload , 2003, SOSP '03.
[4] Mark Handley,et al. SIP: Session Initiation Protocol , 1999, RFC.
[5] D. Box,et al. Simple object access protocol (SOAP) 1.1 , 2000 .
[6] Nick G. Duffield,et al. Trajectory sampling for direct traffic observation , 2001, TNET.
[7] Vern Paxson,et al. Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.
[8] John S. Heidemann,et al. Experiences with a continuous network tracing infrastructure , 2005, MineNet '05.
[9] Burak Dayioglu,et al. USE OF PASSIVE NETWORK MAPPING TO ENHANCE SIGNATURE QUALITY OF MISUSE NETWORK INTRUSION DETECTION SYSTEMS , 2001 .
[10] Richard Lippmann,et al. Experience Using Active and Passive Mapping for Network Situational Awareness , 2006, Fifth IEEE International Symposium on Network Computing and Applications (NCA'06).
[11] Kun-Chan Lan,et al. Rapid model parameterization from traffic measurements , 2002, TOMC.
[12] Raj Srinivasan,et al. RPC: Remote Procedure Call Protocol Specification Version 2 , 1995, RFC.
[13] Kevin Jeffay,et al. What TCP/IP protocol headers can tell us about the web , 2001, SIGMETRICS '01.
[14] Frederic Massicotte,et al. Passive Network Discovery for Real Time Situation Awareness , 2004 .