A methodology for P2P file-sharing traffic detection
- 1 January 2005
- proceedings article
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
No abstract availableThis publication has 13 references indexed in Scilit:
- Accurate, scalable in-network identification of p2p traffic using application signaturesPublished by Association for Computing Machinery (ACM) ,2004
- Analyzing Peer-To-Peer Traffic Across Large NetworksIEEE/ACM Transactions on Networking, 2004
- Deconstructing the Kazaa networkPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- Secure dynamic fragment and replica allocation in large-scale distributed file systemsIEEE Transactions on Parallel and Distributed Systems, 2003
- An analysis of Internet content delivery systemsACM SIGOPS Operating Systems Review, 2002
- Analyzing peer-to-peer traffic across large networksPublished by Association for Computing Machinery (ACM) ,2002
- A signal analysis of network traffic anomaliesPublished by Association for Computing Machinery (ACM) ,2002
- Wide-area cooperative storage with CFSPublished by Association for Computing Machinery (ACM) ,2001
- Characteristics of network traffic flow anomaliesPublished by Association for Computing Machinery (ACM) ,2001
- Bro: a system for detecting network intruders in real-timeComputer Networks, 1999