Monitoring network traffic and detecting emerging P2P ap-plications is an increasingly challenging problem since new applications obfuscate their traffic. Despite recent efforts, the problem is not yet solved and network administrators are still looking for effective and deployable tools. In this paper, we address this problem using Traffic Dispersion Graphs (TDGs), a novel way to analyze traffic. Given a set of flows, a TDG is a graph with an edge between any two IP addresses that communicate. Thus TDGs capture network-wide inter-actions. We start by exploring the potential of TDGs for traffic monitoring by focusing on graph metrics instead of features of individual flows. We then use TDGs to develop an application classification tool dubb...
The principal technique employed in application traffic classification, a task of identifying the ap...
currently lack effective means for discovering and tracking peer-to-peer (P2P) applications on their...
In IP networks, an anomaly detection system identifies attacks, device failures or other unknown pro...
Abstract—Monitoring network traffic and classifying applica-tions are essential functions for networ...
The fundamental problem that motivates this dissertation is the need for better methods and tools to...
Monitoring network traffic and detecting unwanted applications has become a challenging problem, sin...
Network traffic can be represented by a Traffic Dispersion Graph (TDG) that contains an edge between...
The problem of Network Traffic Classification (NTC) has attracted significant amount of interest in ...
This paper focuses on network traffic measurement of Peer-to-Peer (P2P) applications on the Internet...
Identification of network traffic using port-based or payload-based analysis is becoming increasing ...
MasterIn recent years, network traffic anomaly detection has become an important area for both acade...
While peer-to-peer (P2P) systems have emerged in popularity in recent years, their large-scale and c...
While peer-to-peer (P2P) systems have emerged in popularity in recent years, their large-scale and c...
The use of peer-to-peer (P2P) applications is growing dramatically. It concerns applications like Gn...
The second problem that is addressed in the thesis is about traffic analysis and classification. Acc...
The principal technique employed in application traffic classification, a task of identifying the ap...
currently lack effective means for discovering and tracking peer-to-peer (P2P) applications on their...
In IP networks, an anomaly detection system identifies attacks, device failures or other unknown pro...
Abstract—Monitoring network traffic and classifying applica-tions are essential functions for networ...
The fundamental problem that motivates this dissertation is the need for better methods and tools to...
Monitoring network traffic and detecting unwanted applications has become a challenging problem, sin...
Network traffic can be represented by a Traffic Dispersion Graph (TDG) that contains an edge between...
The problem of Network Traffic Classification (NTC) has attracted significant amount of interest in ...
This paper focuses on network traffic measurement of Peer-to-Peer (P2P) applications on the Internet...
Identification of network traffic using port-based or payload-based analysis is becoming increasing ...
MasterIn recent years, network traffic anomaly detection has become an important area for both acade...
While peer-to-peer (P2P) systems have emerged in popularity in recent years, their large-scale and c...
While peer-to-peer (P2P) systems have emerged in popularity in recent years, their large-scale and c...
The use of peer-to-peer (P2P) applications is growing dramatically. It concerns applications like Gn...
The second problem that is addressed in the thesis is about traffic analysis and classification. Acc...
The principal technique employed in application traffic classification, a task of identifying the ap...
currently lack effective means for discovering and tracking peer-to-peer (P2P) applications on their...
In IP networks, an anomaly detection system identifies attacks, device failures or other unknown pro...