Monitoring and analysis of network traffic in P2P environment

被引:0
|
作者
Traceable Secure Network Group, Information Security Research Center, Japan [1 ]
机构
来源
J. Natl. Inst. Inf. Commun. Technol. | 2008年 / 2-3卷 / 33-41期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] Practical Network Traffic Analysis in P2P Environment
    Ban, Tao
    Guo, Shanqing
    Zhang, Zonghua
    2011 7TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2011, : 1801 - 1807
  • [2] Traffic analysis model for P2P file sharing network
    Li, Yipeng
    Ren, Yong
    Yuan, Jian
    Shan, Xiuming
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2011, 51 (06): : 745 - 749
  • [3] An Analysis of Anonymity in Bitcoin Using P2P Network Traffic
    Koshy, Philip
    Koshy, Diana
    McDaniel, Patrick
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014, 2014, 8437 : 469 - 485
  • [4] Characterizing the network behavior of P2P traffic
    Bolla, Raffaele
    Canini, Marco
    Rapuzzi, Riccardo
    Sciuto, Michele
    2008 4TH INTERNATIONAL TELECOMMUNICATION NETWORKING WORKSHOP ON QOS IN MULTISERVICE IP NETWORKS, 2008, : 14 - +
  • [5] Caching the P2P traffic in ISP network
    Ye, Mingjiang
    Wu, Jianping
    Xu, Ke
    2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13, 2008, : 5876 - 5880
  • [6] P2P Traffic Classification for Residential Network
    Thay, Channary
    Visoottiviseth, Vasaka
    Mongkolluksamee, Sophon
    2015 INTERNATIONAL COMPUTER SCIENCE AND ENGINEERING CONFERENCE (ICSEC), 2015, : 222 - 227
  • [7] Interception of P2P Traffic in a Campus Network
    Mehdi, Merouane
    ROMANIAN JOURNAL OF INFORMATION TECHNOLOGY AND AUTOMATIC CONTROL-REVISTA ROMANA DE INFORMATICA SI AUTOMATICA, 2019, 29 (02): : 21 - 34
  • [8] Using statistical discriminators and cluster analysis to P2P and attack traffic monitoring
    Fontenelle do Carmo, Marcus Fabio
    Siqueira Junior, Gabriel Paulino
    Bessa Maia, Jose Everardo
    Holanda, Raimir
    2007 LATIN AMERICAN NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, 2007, : 67 - +
  • [9] Identifying P2P network activities on encrypted traffic
    Wang, Xiaolei
    Yang, Yuexiang
    He, Jie
    2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 893 - 899
  • [10] On the identification and analysis of P2P traffic aggregation
    Dang, Trang Dinh
    Perenyi, Marcell
    Gefferth, Andras
    Molnar, Sandor
    NETWORKING 2006: NETWORKING TECHNOLOGIES, SERVICES, AND PROTOCOLS; PERFORMANCE OF COMPUTER AND COMMUNICATION NETWORKS; MOBILE AND WIRELESS COMMUNICATIONS SYSTEMS, 2006, 3976 : 606 - 617