Adami et al., 2012 - Google Patents
Skype‐hunter: A real‐time system for the detection and classification of skype trafficAdami et al., 2012
View PDF- Document ID
- 4439577590380848332
- Author
- Adami D
- Callegari C
- Giordano S
- Pagano M
- Pepe T
- Publication year
- Publication venue
- International Journal of Communication Systems
External Links
Snippet
In the previous years, Skype has gained more and more popularity, since it is seen as the best VoIP software with good quality of sound, ease of use and one that works everywhere and with every OS. Because of its great diffusion, both the operators and the users are, for …
- 238000001514 detection method 0 title description 20
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Adami et al. | Skype‐hunter: A real‐time system for the detection and classification of skype traffic | |
Li et al. | A survey of network flow applications | |
Chaabane et al. | Digging into anonymous traffic: A deep analysis of the tor anonymizing network | |
Tammaro et al. | Exploiting packet‐sampling measurements for traffic characterization and classification | |
KR20080061055A (en) | System and method for identifying p2p application service | |
Chopra et al. | Peer-to-peer overlays for real-time communication: security issues and solutions | |
Foremski et al. | DNS‐Class: immediate classification of IP flows using DNS | |
Sinam et al. | A technique for classification of VoIP flows in UDP media streams using VoIP signalling traffic | |
Adami et al. | A real-time algorithm for skype traffic detection and classification | |
Fazio et al. | On packet marking and Markov modeling for IP Traceback: A deep probabilistic and stochastic analysis | |
Molnár et al. | On the identification and analysis of Skype traffic | |
Reddy et al. | Heuristic-based real-time p2p traffic identification | |
Parsons | Deep Packet Inspection in Perspective: Tracing its lineage and surveillance potentials | |
Elahi et al. | CORDON–a taxonomy of internet censorship resistance strategies | |
Chakravarty | Traffic analysis attacks and defenses in low latency anonymous communication | |
Yu et al. | Traffic identification and overlay measurement of Skype | |
Baldi et al. | Service-based traffic classification: Principles and validation | |
Leung et al. | Network forensic on encrypted peer-to-peer voip traffics and the detection, blocking, and prioritization of skype traffics | |
Sinam et al. | An efficient technique for detecting Skype flows in UDP media streams | |
Saad et al. | A collaborative peer-to-peer architecture to defend against DDoS attacks | |
Wrana et al. | The spectre of surveillance and censorship in future internet architectures | |
Ganesan et al. | A scalable detection and prevention scheme for voice over internet protocol (VoIP) signaling attacks using handler with Bloom filter | |
Seedorf | Security issues for P2P-based voice-and video-streaming applications | |
Yoon et al. | Header signature maintenance for Internet traffic identification | |
Benson | Leveraging internet background radiation for opportunistic network analysis |