• LASS

  • Referenced in 30 articles [sw00505]
  • illustrated by using a trace of Internet traffic measurements, can also be applied to economic...
  • NS-3

  • Referenced in 4 articles [sw07496]
  • investigate the relationship between the mean traffic flow experienced by a node and its standard ... means of a realistic internet traffic simulator software: NS-3. We also show that...
  • Geist

  • Referenced in 3 articles [sw01286]
  • need to understand the implications of web traffic characteristics on the architectural aspects ... server. This requires generation of aggregate Internet traffic from a server’s perspective without having...
  • AMON

  • Referenced in 3 articles [sw35497]
  • Forensics of Multi-gigabit Streams. The Internet, as a global system of interconnected networks, carries ... commodity hardware. AMON examines all packets, partitions traffic into sub-streams by using rapid hashing ... intensity and connectivity structure of network traffic at the time-scale of routing. The proposed ... currently processing 10Gbps+ live Internet traffic at Merit Network. It is extensible and allows...
  • CoralReef

  • Referenced in 2 articles [sw04167]
  • collect and analyze data from passive Internet traffic monitors, in real time or from trace ... with the support and collaboration of the Internet measurement community...
  • Rigel

  • Referenced in 2 articles [sw40556]
  • protein interactions in biological networks, and Internet traffic analysis. The arrival of massive graphs with...
  • Flamingo

  • Referenced in 1 article [sw12239]
  • Flamingo: visualizing internet traffic. In this paper we describe a set of visualization techniques that ... managing a network by representing network traffic information in a concise and intuitive manner ... that can be used to explore Internet traffic flow data. Flamingo is able to process ... simple examples, based on traffic data from a busy Internet backbone router, how Flamingo...
  • Autograph

  • Referenced in 16 articles [sw23929]
  • halt and reverse the spreading of novel Internet worms. Generation of the worm signatures required ... byte patterns sought in monitored traffic to identify worms--today entails non-trivial human labor ... system that automatically generates signatures for novel Internet worms that propagate using TCP transport...
  • AMRST

  • Referenced in 1 article [sw02423]
  • simultaneously. However, the subsequent mass of Internet traffic usually increases the network congestion and degrades ... broadcasting-oriented broadband satellite networks into the Internet backbone. This paper presents a novel adaptive...
  • PACKTER

  • Referenced in 1 article [sw11026]
  • PACKTER: implementation of Internet traffic visualizer and extension for network forensics. Traffic visualization tools help...
  • PCAV

  • Referenced in 2 articles [sw02612]
  • including Internet worms, DDoS attacks and network scanning activities. PCAV displays network traffic...
  • TRANSYT-7F

  • Referenced in 12 articles [sw20614]
  • Traffic Network Study Tool. TRANSYT-7F release 11 features genetic algorithm optimization of cycle length ... TRANSYT-7F requires Microsoft Windows and Microsoft Internet Explorer. Click on the hyperlinks below...
  • Fiddler

  • Referenced in 1 article [sw33523]
  • traffic between your computer and the Internet. Inspect traffic, set breakpoints, and fiddle with request/response...
  • BotMiner

  • Referenced in 5 articles [sw21748]
  • BotMiner: Clustering analysis of network traffic for protocol-and structure-independent botnet detection. Botnets ... platform for many Internet attacks, such as spam, distributed denial-of-service (DDoS), identity theft ... Accordingly, our detection framework clusters similar communication traffic and similar malicious traffic, and performs cross...
  • SRTP

  • Referenced in 3 articles [sw02462]
  • Internet community strongly fears UDP-based multimedia applications, because the UDP traffic could lead...
  • EQPO

  • Referenced in 1 article [sw16110]
  • EQPO: obscuring encrypted web traffic with equal-sized pseudo-objects. Internet users are concerned with ... introduces a typical request-response-based network traffic which is associated with the structure...
  • EdgeRewire

  • Referenced in 7 articles [sw40656]
  • physical/hardware requirement (e.g., count of ISP router traffic switches) of nodes remain unchanged. Different from ... real-world datasets from three different domains (Internet AS-level, P2P, and airport flights graphs...
  • BotFinder

  • Referenced in 1 article [sw21738]
  • BotFinder: Finding bots in network traffic without deep packet inspection. Bots are the root cause ... many security problems on the Internet, as they send spam, steal information from infected machines ... installations, or, if they operate on network traffic, require deep packet inspection for signature matching...
  • FleetWave

  • Referenced in 1 article [sw17038]
  • sizes of fleet operations, using an Internet or Intranet platform. FleetWave is a true ... slow down when dealing with substantial traffic. This means that the software can be accessed ... requirement to view the system is an internet connection. FleetWave is database independent...
  • MAGNeT

  • Referenced in 1 article [sw00541]
  • Internet) to enable fast, large-scale distributed computing. A detailed understanding of the communication traffic...