Identification of P2P traffic based on the content redistribution characteristic
暂无分享,去创建一个
Xing Li | Haixin Duan | Xing Lu | Haixin Duan | Xing Lu | Xing Li
[1] Hiroshi Esaki,et al. The impact and implications of the growth in residential user-to-user traffic , 2006, SIGCOMM.
[2] Panayiotis Mavrommatis,et al. Identifying Known and Unknown Peer-to-Peer Traffic , 2006, Fifth IEEE International Symposium on Network Computing and Applications (NCA'06).
[3] Michalis Faloutsos,et al. Is P2P dying or just hiding? [P2P traffic measurement] , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..
[4] Erwin P. Rathgeb,et al. Evaluation of an Efficient Measurement Concept for P2P Multiprotocol Traffic Analysis , 2006, 32nd EUROMICRO Conference on Software Engineering and Advanced Applications (EUROMICRO'06).
[5] Patrick Haffner,et al. ACAS: automated construction of application signatures , 2005, MineNet '05.
[6] Oliver Spatscheck,et al. Accurate, scalable in-network identification of p2p traffic using application signatures , 2004, WWW '04.
[7] Michalis Faloutsos,et al. Transport layer identification of P2P traffic , 2004, IMC '04.
[8] George Varghese,et al. Automated Worm Fingerprinting , 2004, OSDI.
[9] B. Cohen,et al. Incentives Build Robustness in Bit-Torrent , 2003 .
[10] Krishna P. Gummadi,et al. An analysis of Internet content delivery systems , 2002, OPSR.
[11] Jia Wang,et al. Analyzing peer-to-peer traffic across large networks , 2002, IMW '02.
[12] Carey L. Williamson,et al. A Longitudinal Study of P2P Traffic Classification , 2006, 14th IEEE International Symposium on Modeling, Analysis, and Simulation.
[13] Yang Liu,et al. Solving the App-Level Classification Problem of P2P Traffic Via Optimized Support Vector Machines , 2006, Sixth International Conference on Intelligent Systems Design and Applications.
[14] Roberto Di Pietro,et al. A methodology for P2P file-sharing traffic detection , 2005, Second International Workshop on Hot Topics in Peer-to-Peer Systems.