What TCP/IP protocol headers can tell us about the web
Proceedings of the 2001 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
IEEE Internet Computing
Traffic classification for application specific peering
Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment
Quality in measurement: beyond the deployment barrier
SAINT-W '02 Proceedings of the 2002 Symposium on Applications and the Internet (SAINT) Workshops
An analysis of Internet chat systems
Proceedings of the 3rd ACM SIGCOMM conference on Internet measurement
Behavioral Authentication of Server Flows
ACSAC '03 Proceedings of the 19th Annual Computer Security Applications Conference
Measuring and analyzing the characteristics of Napster and Gnutella hosts
Multimedia Systems
Analyzing peer-to-peer traffic across large networks
IEEE/ACM Transactions on Networking (TON)
Accurate, scalable in-network identification of p2p traffic using application signatures
Proceedings of the 13th international conference on World Wide Web
Mining with rarity: a unifying framework
ACM SIGKDD Explorations Newsletter - Special issue on learning from imbalanced datasets
Transport layer identification of P2P traffic
Proceedings of the 4th ACM SIGCOMM conference on Internet measurement
Strategies for sound internet measurement
Proceedings of the 4th ACM SIGCOMM conference on Internet measurement
OC3MON: Flexible, Affordable, High Performance Staistics Collection
LISA '96 Proceedings of the 10th USENIX conference on System administration
The OSU Flow-tools Package and CISCO NetFlow Logs
LISA '00 Proceedings of the 14th USENIX conference on System administration
FlowScan: A Network Traffic Flow Reporting and Visualization Tool
LISA '00 Proceedings of the 14th USENIX conference on System administration
The CoralReef Software Suite as a Tool for System and Network Administrators
LISA '01 Proceedings of the 15th USENIX conference on System administration
An analysis of internet content delivery systems
OSDI '02 Proceedings of the 5th symposium on Operating systems design and implementationCopyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading
Internet traffic classification using bayesian analysis techniques
SIGMETRICS '05 Proceedings of the 2005 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
Mining anomalies using traffic feature distributions
Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications
BLINC: multilevel traffic classification in the dark
Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications
ACAS: automated construction of application signatures
Proceedings of the 2005 ACM SIGCOMM workshop on Mining network data
A Methodology for P2P File-Sharing Traffic Detection
HOT-P2P '05 Proceedings of the Second International Workshop on Hot Topics in Peer-to-Peer Systems
Estimating flow distributions from sampled flow statistics
IEEE/ACM Transactions on Networking (TON)
Automated Traffic Classification and Application Identification using Machine Learning
LCN '05 Proceedings of the The IEEE Conference on Local Computer Networks 30th Anniversary
Traffic classification on the fly
ACM SIGCOMM Computer Communication Review
A Longitudinal Study of P2P Traffic Classification
MASCOTS '06 Proceedings of the 14th IEEE International Symposium on Modeling, Analysis, and Simulation
Identifying Known and Unknown Peer-to-Peer Traffic
NCA '06 Proceedings of the Fifth IEEE International Symposium on Network Computing and Applications
Algorithms to accelerate multiple regular expressions matching for deep packet inspection
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
Traffic classification using clustering algorithms
Proceedings of the 2006 SIGCOMM workshop on Mining network data
ACM SIGCOMM Computer Communication Review
Unexpected means of protocol inference
Proceedings of the 6th ACM SIGCOMM conference on Internet measurement
Internet Measurement: Infrastructure, Traffic and Applications
Internet Measurement: Infrastructure, Traffic and Applications
Traffic classification through simple statistical fingerprinting
ACM SIGCOMM Computer Communication Review
Identifying and discriminating between web and peer-to-peer traffic in the network core
Proceedings of the 16th international conference on World Wide Web
On Inferring Application Protocol Behaviors in Encrypted Network Traffic
The Journal of Machine Learning Research
Should internet service providers fear peer-assisted content distribution?
IMC '05 Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement
OSDI'04 Proceedings of the 6th conference on Symposium on Opearting Systems Design & Implementation - Volume 6
An architecture for generating semantics-aware signatures
SSYM'05 Proceedings of the 14th conference on USENIX Security Symposium - Volume 14
ACM SIGCOMM Computer Communication Review
Revealing skype traffic: when randomness plays with you
Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications
Offline/realtime traffic classification using semi-supervised learning
Performance Evaluation
High speed deep packet inspection with hardware support
High speed deep packet inspection with hardware support
Legal issues surrounding monitoring during network research
Proceedings of the 7th ACM SIGCOMM conference on Internet measurement
Understanding passive and active service discovery
Proceedings of the 7th ACM SIGCOMM conference on Internet measurement
Issues and etiquette concerning use of shared measurement data
Proceedings of the 7th ACM SIGCOMM conference on Internet measurement
Network monitoring using traffic dispersion graphs (tdgs)
Proceedings of the 7th ACM SIGCOMM conference on Internet measurement
The Evolution of the Peer-to-Peer File Sharing Industry and the Security Risks for Users
HICSS '08 Proceedings of the Proceedings of the 41st Annual Hawaii International Conference on System Sciences
NetADHICT: a tool for understanding network traffic
LISA'07 Proceedings of the 21st conference on Large Installation System Administration Conference
A methodology for P2P traffic measurement using application signature work-in-progress
Proceedings of the 2nd international conference on Scalable information systems
A comparative analysis of web and peer-to-peer traffic
Proceedings of the 17th international conference on World Wide Web
Early application identification
CoNEXT '06 Proceedings of the 2006 ACM CoNEXT conference
LISABETH: automated content-based signature generator for zero-day polymorphic worms
Proceedings of the fourth international workshop on Software engineering for secure systems
A Preliminary Investigation of Skype Traffic Classification Using a Minimalist Feature Set
ARES '08 Proceedings of the 2008 Third International Conference on Availability, Reliability and Security
IMRG workshop on application classification and identification report
ACM SIGCOMM Computer Communication Review
Deflating the big bang: fast and scalable deep packet inspection with extended finite automata
Proceedings of the ACM SIGCOMM 2008 conference on Data communication
Statistical Techniques for Network Security: Modern Statistically-Based Intrusion Detection and Protection
Why file sharing networks are dangerous?
Communications of the ACM - Inspiring Women in Computing
Tunnel Hunter: Detecting application-layer tunnels with statistical fingerprinting
Computer Networks: The International Journal of Computer and Telecommunications Networking
ICTAI '08 Proceedings of the 2008 20th IEEE International Conference on Tools with Artificial Intelligence - Volume 01
A Framework for Detecting Internet Applications
Information Networking. Towards Ubiquitous Networking and Services
Pattern Recognition Approaches for Classifying IP Flows
SSPR & SPR '08 Proceedings of the 2008 Joint IAPR International Workshop on Structural, Syntactic, and Statistical Pattern Recognition
A nonlinear, recurrence-based approach to traffic classification
Computer Networks: The International Journal of Computer and Telecommunications Networking
Efficient application identification and the temporal and spatial stability of classification schema
Computer Networks: The International Journal of Computer and Telecommunications Networking
Profiling and identification of P2P traffic
Computer Networks: The International Journal of Computer and Telecommunications Networking
Cross-Layer Peer-to-Peer Traffic Identification and Optimization Based on Active Networking
Active and Programmable Networks
Rapid identification of Skype traffic flows
Proceedings of the 18th international workshop on Network and operating systems support for digital audio and video
Internet traffic classification demystified: myths, caveats, and the best practices
CoNEXT '08 Proceedings of the 2008 ACM CoNEXT Conference
Application of Markov Chain in IP Traffic Classification
NSWCTC '09 Proceedings of the 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing - Volume 02
GTVS: Boosting the Collection of Application Traffic Ground Truth
TMA '09 Proceedings of the First International Workshop on Traffic Monitoring and Analysis
TIE: A Community-Oriented Traffic Classification Platform
TMA '09 Proceedings of the First International Workshop on Traffic Monitoring and Analysis
Accurate, Fine-Grained Classification of P2P-TV Applications by Simply Counting Packets
TMA '09 Proceedings of the First International Workshop on Traffic Monitoring and Analysis
KISS: Stochastic Packet Inspection
TMA '09 Proceedings of the First International Workshop on Traffic Monitoring and Analysis
Review: Application classification using packet size distribution and port association
Journal of Network and Computer Applications
Support Vector Machines for TCP traffic classification
Computer Networks: The International Journal of Computer and Telecommunications Networking
High-speed string matching for network intrusion detection
International Journal of Communication Networks and Distributed Systems
A Real-Time Algorithm for Skype Traffic Detection and Classification
NEW2AN '09 and ruSMART '09 Proceedings of the 9th International Conference on Smart Spaces and Next Generation Wired/Wireless Networking and Second Conference on Smart Spaces
In-the-dark network traffic classification using support vector machines
IAAI'08 Proceedings of the 20th national conference on Innovative applications of artificial intelligence - Volume 3
GT: picking up the truth from the ground for internet traffic
ACM SIGCOMM Computer Communication Review
Early traffic classification using support vector machines
Proceedings of the 5th International Latin American Networking Conference
NetPDL: An extensible XML-based language for packet header description
Computer Networks: The International Journal of Computer and Telecommunications Networking
The WEKA data mining software: an update
ACM SIGKDD Explorations Newsletter
Detection of Encrypted Traffic in eDonkey Network through Application Signatures
AP2PS '09 Proceedings of the 2009 First International Conference on Advances in P2P Systems
A Labeled Data Set for Flow-Based Intrusion Detection
IPOM '09 Proceedings of the 9th IEEE International Workshop on IP Operations and Management
Service-based traffic classification: principles and validation
SARNOFF'09 Proceedings of the 32nd international conference on Sarnoff symposium
Graph-based P2P traffic classification at the internet backbone
INFOCOM'09 Proceedings of the 28th IEEE international conference on Computer Communications Workshops
Early recognition of encrypted applications
PAM'07 Proceedings of the 8th international conference on Passive and active network measurement
Improving cost and accuracy of DPI traffic classifiers
Proceedings of the 2010 ACM Symposium on Applied Computing
On the validation of traffic classification algorithms
PAM'08 Proceedings of the 9th international conference on Passive and active network measurement
Advanced Data Mining Techniques
Advanced Data Mining Techniques
Better network traffic identification through the independent combination of techniques
Journal of Network and Computer Applications
An experimental evaluation of the computational cost of a DPI traffic classifier
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
A first look at peer-to-peer worms: threats and defenses
IPTPS'05 Proceedings of the 4th international conference on Peer-to-Peer Systems
Toward the accurate identification of network applications
PAM'05 Proceedings of the 6th international conference on Passive and Active Network Measurement
A traffic identification method and evaluations for a pure p2p application
PAM'05 Proceedings of the 6th international conference on Passive and Active Network Measurement
Traffic classification using a statistical approach
PAM'05 Proceedings of the 6th international conference on Passive and Active Network Measurement
Self-Learning IP traffic classification based on statistical flow characteristics
PAM'05 Proceedings of the 6th international conference on Passive and Active Network Measurement
Detecting VoIP calls hidden in web traffic
IEEE Transactions on Network and Service Management
A survey of techniques for internet traffic classification using machine learning
IEEE Communications Surveys & Tutorials
Peer-to-peer overlays for real-time communication: security issues and solutions
IEEE Communications Surveys & Tutorials
A Survey on Internet Traffic Identification
IEEE Communications Surveys & Tutorials
Measurement and analysis of IP network usage and behavior
IEEE Communications Magazine
Advanced network monitoring brings life to the awareness plane
IEEE Communications Magazine
Packet Trains--Measurements and a New Model for Computer Network Traffic
IEEE Journal on Selected Areas in Communications
A parameterizable methodology for Internet traffic flow profiling
IEEE Journal on Selected Areas in Communications
Bayesian Neural Networks for Internet Traffic Classification
IEEE Transactions on Neural Networks
Packet-level traffic measurements from the Sprint IP backbone
IEEE Network: The Magazine of Global Internetworking
Security challenges for peer-to-peer SIP
IEEE Network: The Magazine of Global Internetworking
The Extensive Challenges of Internet Application Measurement
IEEE Network: The Magazine of Global Internetworking
PeerRush: mining for unwanted p2p traffic
DIMVA'13 Proceedings of the 10th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment
Hi-index | 0.00 |
The emergence of new Internet paradigms has changed the common properties of network data, increasing the bandwidth consumption and balancing traffic in both directions. These facts raise important challenges, making it necessary to devise effective solutions for managing network traffic. Since traditional methods are rather ineffective and easily bypassed, particular attention has been paid to the development of new approaches for traffic classification. This article surveys the studies on peer-to-peer traffic detection and classification, making an extended review of the literature. Furthermore, it provides a comprehensive analysis of the concepts and strategies for network monitoring.