[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Adami et al., 2012 - Google Patents

Skype‐hunter: A real‐time system for the detection and classification of skype traffic

Adami et al., 2012

View PDF
Document ID
4439577590380848332
Author
Adami D
Callegari C
Giordano S
Pagano M
Pepe T
Publication year
Publication venue
International Journal of Communication Systems

External Links

Snippet

In the previous years, Skype has gained more and more popularity, since it is seen as the best VoIP software with good quality of sound, ease of use and one that works everywhere and with every OS. Because of its great diffusion, both the operators and the users are, for …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection

Similar Documents

Publication Publication Date Title
Adami et al. Skype‐hunter: A real‐time system for the detection and classification of skype traffic
Li et al. A survey of network flow applications
Chaabane et al. Digging into anonymous traffic: A deep analysis of the tor anonymizing network
Tammaro et al. Exploiting packet‐sampling measurements for traffic characterization and classification
KR20080061055A (en) System and method for identifying p2p application service
Chopra et al. Peer-to-peer overlays for real-time communication: security issues and solutions
Foremski et al. DNS‐Class: immediate classification of IP flows using DNS
Sinam et al. A technique for classification of VoIP flows in UDP media streams using VoIP signalling traffic
Adami et al. A real-time algorithm for skype traffic detection and classification
Fazio et al. On packet marking and Markov modeling for IP Traceback: A deep probabilistic and stochastic analysis
Molnár et al. On the identification and analysis of Skype traffic
Reddy et al. Heuristic-based real-time p2p traffic identification
Parsons Deep Packet Inspection in Perspective: Tracing its lineage and surveillance potentials
Elahi et al. CORDON–a taxonomy of internet censorship resistance strategies
Chakravarty Traffic analysis attacks and defenses in low latency anonymous communication
Yu et al. Traffic identification and overlay measurement of Skype
Baldi et al. Service-based traffic classification: Principles and validation
Leung et al. Network forensic on encrypted peer-to-peer voip traffics and the detection, blocking, and prioritization of skype traffics
Sinam et al. An efficient technique for detecting Skype flows in UDP media streams
Saad et al. A collaborative peer-to-peer architecture to defend against DDoS attacks
Wrana et al. The spectre of surveillance and censorship in future internet architectures
Ganesan et al. A scalable detection and prevention scheme for voice over internet protocol (VoIP) signaling attacks using handler with Bloom filter
Seedorf Security issues for P2P-based voice-and video-streaming applications
Yoon et al. Header signature maintenance for Internet traffic identification
Benson Leveraging internet background radiation for opportunistic network analysis