In this paper we present PeerRush, a novel system for the identification of unwanted P2P traffic. Unlike most previous work, PeerRush goes beyond P2P traffic detection, and can …
S Abt, H Baier - 2014 third international workshop on building …, 2014 - ieeexplore.ieee.org
Network security is a long-lasting field of research constantly encountering new challenges. Inherently, research in this field is highly data-driven. Specifically, many approaches employ …
In this paper we present PeerRush, a novel system for the identification of unwanted P2P traffic. Unlike most previous work, PeerRush goes beyond P2P traffic detection, and can …
Privacy-preserving traffic flow classification has attracted a significant amount of research interest because of its increasing importance to both network management and privacy …
L Arshadi, AH Jahangir - International Journal of …, 2017 - Wiley Online Library
In this paper, we study the effects of anomalies on the distribution of TCP flow interarrival time process. We show empirically that despite the variety of data networks in size, number …
Classification of Internet traffic based on its applications is significantly important for better network management. The existing approaches for P2P traffic identification are port-based …
The Sensing network attack connection has the characteristics of behavioral variability and complexity. It is not feasible to construct an abnormal intrusion detection model by using …
J Jusko, M Rehak - International Journal of Network …, 2014 - Wiley Online Library
In this paper we present a unified solution to identify peer‐to‐peer (P2P) communities operating in the network. We propose an algorithm that is able to progressively discover …
AD Singh - 2008 IEEE International Test Conference, 2008 - ieeexplore.ieee.org
We present a new structural delay test methodology that identifies small timing anomalies in dual/multi core processor circuits by comparing the relative switching time of identical circuit …