Classification of hidden network streams

0Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Traffic analysis is an important issue for network monitoring and security. We focus on identifying protocols for network traffic by analysing the size, timing and direction of network packets. By using these network stream characteristics, we propose a technique for modelling the behaviour of various TCP protocols. This model can be used for recognising protocols even when running under encrypted tunnels. This is complemented with experimental evaluation on real world network data. © Springer-Verlag Berlin Heidelberg 2006.

Cite

CITATION STYLE

APA

Gebski, M., Penev, A., & Wong, R. K. (2006). Classification of hidden network streams. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4081 LNCS, pp. 332–341). Springer Verlag. https://doi.org/10.1007/11823728_32

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free