Cyber scanning: a comprehensive survey

E Bou-Harb, M Debbabi, C Assi - Ieee communications surveys …, 2013 - ieeexplore.ieee.org
Cyber scanning refers to the task of probing enterprise networks or Internet wide services,
searching for vulnerabilities or ways to infiltrate IT assets. This misdemeanor is often the …

[PDF][PDF] State of the art in traffic classification: A research review

M Zhang, W John, K Claffy, N Brownlee - PAM Student Workshop, 2009 - sjalander.com
The Internet, while emerging as the key component for all sorts of communication, is far from
well-understood. The goal of traffic classification is to understand the type of traffic carried on …

An active-passive measurement study of TCP performance over LTE on high-speed rails

J Wang, Y Zheng, Y Ni, C Xu, F Qian, W Li… - The 25th Annual …, 2019 - dl.acm.org
High-speed rail (HSR) systems potentially provide a more efficient way of door-to-door
transportation than airplane. However, they also pose unprecedented challenges in …

Observing slow crustal movement in residential user traffic

K Cho, K Fukuda, H Esaki, A Kato - Proceedings of the 2008 ACM …, 2008 - dl.acm.org
It is often argued that rapidly increasing video content along with the penetration of high-
speed access is leading to explosive growth in the Internet traffic. Contrary to this popular …

Analysis of udp traffic usage on internet backbone links

M Zhang, M Dusi, W John… - 2009 Ninth Annual …, 2009 - ieeexplore.ieee.org
We compared UDP and TCP traffic in several traffic traces collected from different networks
and geographical locations, at different times. We find that TCP still dominates in terms of …

Achieving flexible and lightweight multipath congestion control through online learning

R Zhuang, J Han, K Xue, J Li, DSL Wei… - … on Network and …, 2022 - ieeexplore.ieee.org
The upgrade of network devices to be equipped with multiple network interfaces makes it
possible to improve network throughput performance through multipath transmission …

Fine‐grained traffic classification based on functional separation

B Park, Y Won, JY Chung, M Kim… - International Journal of …, 2013 - Wiley Online Library
Current efforts to classify Internet traffic highlight accuracy. Previous studies have focused on
the detection of major applications such as P2P and streaming applications. However, these …

Leakage of. onion at the DNS Root: Measurements, Causes, and Countermeasures

A Mohaisen, K Ren - IEEE/ACM Transactions on Networking, 2017 - ieeexplore.ieee.org
The Tor hidden services, one of the features of the Tor anonymity network, are widely used
for providing anonymity to services within the Tor network. Tor uses the. onion pseudo-top …

Passive internet measurement: Overview and guidelines based on experiences

W John, S Tafvelin, T Olovsson - Computer Communications, 2010 - Elsevier
Due to its versatility, flexibility and fast development, the modern Internet is far from being
well understood in its entirety. A good way to learn more about how the Internet functions is …

Estimating routing symmetry on single links by passive flow measurements

W John, M Dusi, KC Claffy - Proceedings of the 6th International …, 2010 - dl.acm.org
The assumption of routing symmetry is often embedded into traffic analysis and classification
tools. This paper uses passively captured network data to estimate the amount of traffic …