Analyzing peer-to-peer traffic across large networks
IEEE/ACM Transactions on Networking (TON)
Accurate, scalable in-network identification of p2p traffic using application signatures
Proceedings of the 13th international conference on World Wide Web
Transport layer identification of P2P traffic
Proceedings of the 4th ACM SIGCOMM conference on Internet measurement
An analysis of TCP reset behaviour on the internet
ACM SIGCOMM Computer Communication Review
Flow analysis of internet traffic: World Wide Web versus peer-to-peer
Systems and Computers in Japan
Traffic classification through simple statistical fingerprinting
ACM SIGCOMM Computer Communication Review
Analysis of internet backbone traffic and header anomalies observed
Proceedings of the 7th ACM SIGCOMM conference on Internet measurement
Toward the accurate identification of network applications
PAM'05 Proceedings of the 6th international conference on Passive and Active Network Measurement
Analysis of peer-to-peer traffic on ADSL
PAM'05 Proceedings of the 6th international conference on Passive and Active Network Measurement
Observing slow crustal movement in residential user traffic
CoNEXT '08 Proceedings of the 2008 ACM CoNEXT Conference
Review: Passive internet measurement: Overview and guidelines based on experiences
Computer Communications
Estimating routing symmetry on single links by passive flow measurements
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference
On collection of large-scale multi-purpose datasets on internet backbone links
Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security
An analysis of longitudinal TCP passive measurements
TMA'11 Proceedings of the Third international conference on Traffic monitoring and analysis
Size-based flow-scheduling using spike-detection
ASMTA'11 Proceedings of the 18th international conference on Analytical and stochastic modeling techniques and applications
Realistic underlays for overlay simulation
Proceedings of the 4th International ICST Conference on Simulation Tools and Techniques
Tracking malicious hosts on a 10gbps backbone link
NordSec'10 Proceedings of the 15th Nordic conference on Information Security Technology for Applications
A spike-detecting AQM to deal with elephants
Computer Networks: The International Journal of Computer and Telecommunications Networking
Photonic Network Communications
Hi-index | 0.00 |
In order to reveal the influence of different traffic classes on the Internet, backbone traffic was collected within an eight month period on backbone links of the Swedish University Network (SUNET). The collected data was then classified according to network application. In this study, three traffic classes (P2P, Web and malicious) are compared in terms of traffic volumes and signaling behavior. Furthermore, longitudinal trends and diurnal differences are highlighted. It is shown that traffic volumes are increasing considerably, with P2P-traffic clearly dominating. In contrast, the amount of malicious and attack traffic remains constant, even not exhibiting diurnal patterns. Next, P2P and Web traffic are shown to differ significantly in connection establishment and termination behavior. Finally, an analysis of TCP option usage revealed that Selective Acknowledgment (SACK), even though deployed by most web-clients, is still neglected by a number of popular web-servers.