Accurate, scalable in-network identification of p2p traffic using application signatures
Proceedings of the 13th international conference on World Wide Web
Proceedings of the 4th ACM SIGCOMM conference on Internet measurement
An analysis of internet content delivery systems
OSDI '02 Proceedings of the 5th symposium on Operating systems design and implementationCopyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading
Flow-Based Identification of P2P Heavy-Hitters
ICISP '06 Proceedings of the International Conference on Internet Surveillance and Protection
Identifying Known and Unknown Peer-to-Peer Traffic
NCA '06 Proceedings of the Fifth IEEE International Symposium on Network Computing and Applications
Should internet service providers fear peer-assisted content distribution?
IMC '05 Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement
Reducing unwanted traffic in a backbone network
SRUTI'05 Proceedings of the Steps to Reducing Unwanted Traffic on the Internet on Steps to Reducing Unwanted Traffic on the Internet Workshop
Revealing skype traffic: when randomness plays with you
Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications
Hi-index | 0.00 |
With the fast growing of internet, ISPs are faced with added challenges from unwanted bulk traffic. To deal with this problem, Tsinghua university implements bulk traffic mitigation practices to contain excessive use of bandwidth. Result indicates that current strategy can effectively decrease heavy use of bandwidth from aggressive applications. The strategy selection, effectiveness of the different practice and the selection of the quota limit are studied aided by the traffic statistics with and without these practices. Challenges to current bulk traffic mitigation practices are also discussed.