Sciweavers

19 search results - page 1 / 4
» Using Traffic Analysis to Identify Tor Usage - A Proposed St...
Sort
View
CSREASAM
2010
13 years 2 months ago
Using Traffic Analysis to Identify Tor Usage - A Proposed Study
John Barker, Peter Hannay, Christopher Bolan
APNOMS
2006
Springer
13 years 9 months ago
Detecting and Identifying Network Anomalies by Component Analysis
Many research works address detection and identification of network anomalies using traffic analysis. This paper considers large topologies, such as those of an ISP, with traffic a...
Le The Quyen, Marat Zhanikeev, Yoshiaki Tanaka
E2EMON
2006
IEEE
13 years 9 months ago
Object-Relational DBMS for Packet-Level Traffic Analysis: Case Study on Performance Optimization
Analyzing Internet traffic at packet level involves generally large amounts of raw data, derived data, and results from various analysis tasks. In addition, the analysis often proc...
Matti Siekkinen, Ernst W. Biersack, Vera Goebel
MASCOTS
2004
13 years 6 months ago
Analysis of Peer-to-Peer Systems: Workload Characterization and Effects on Traffic Cacheability
Peer-to-peer file sharing networks have emerged as a new popular application in the Internet scenario. In this paper, we provide an analytical model of the resources size and of t...
Mauro Andreolini, Riccardo Lancellotti, Philip S. ...
IMC
2010
ACM
13 years 3 months ago
On economic heavy hitters: shapley value analysis of 95th-percentile pricing
Cost control for the Internet access providers (AP) influences not only the nominal speeds offered to the customers, but also other, more controversial, policies related to traffi...
Rade Stanojevic, Nikolaos Laoutaris, Pablo Rodrigu...