On the self-similar nature of Ethernet traffic (extended version)
IEEE/ACM Transactions on Networking (TON)
Wide area traffic: the failure of Poisson modeling
IEEE/ACM Transactions on Networking (TON)
Self-similarity in World Wide Web traffic: evidence and possible causes
IEEE/ACM Transactions on Networking (TON)
Proceedings of the 10th ACM conference on Computer and communications security
Active Timing-Based Correlation of Perturbed Traffic Flows with Chaff Packets
ICDCSW '05 Proceedings of the Second International Workshop on Security in Distributed Computing Systems (SDCS) (ICDCSW'05) - Volume 02
Tracking anonymous peer-to-peer VoIP calls on the internet
Proceedings of the 12th ACM conference on Computer and communications security
A First Step towards Live Botmaster Traceback
RAID '08 Proceedings of the 11th international symposium on Recent Advances in Intrusion Detection
Survey on anonymous communications in computer networks
Computer Communications
Online Sketching of Network Flows for Real-Time Stepping-Stone Detection
ACSAC '09 Proceedings of the 2009 Annual Computer Security Applications Conference
RAID'02 Proceedings of the 5th international conference on Recent advances in intrusion detection
Journal of Computational Neuroscience
Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking
IEEE Transactions on Dependable and Secure Computing
A survey of anonymous peer-to-peer file-sharing
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Detection of Information Flows
IEEE Transactions on Information Theory
On multimedia networks: self-similar traffic and network performance
IEEE Communications Magazine
Hi-index | 0.08 |
The problem of detecting the presence of possibly bidirectional and time-varying information flows through two nodes in a network is considered. Only the transmission timing measurements are used in the detection. The proposed technique assumes no parametric flow model and requires no training data. The consistency of the detector is established for a class of non-homogeneous Poisson traffic. The proposed detector is tested in a simulation using LBL TCP traces (Paxson and Floyd, 1995 [24]) and an experiment involving MSN VoIP sessions.