Analysis of Internet Datasets | |
Understanding and Preparing for DNS Evolution | p. 1 |
Characterizing Traffic Flows Originating from Large-Scale Video Sharing Services | p. 17 |
Mixing Biases: Structural Changes in the AS Topology Evolution | p. 32 |
Tools for Traffic Analysis and Monitoring | |
EmPath: Tool to Emulate Packet Transfer Characteristics in IP Network | p. 46 |
A Database of Anomalous Traffic for Assessing Profile Based IDS | p. 59 |
Collection and Exploration of Large Data Monitoring Sets Using Bitmap Databases | p. 73 |
DeSRTO: An Effective Algorithm for SRTO Detection in TCP Connections | p. 87 |
Traffic Classification | |
Uncovering Relations between Traffic Classifiers and Anomaly Detectors via Graph Theory | p. 101 |
Kiss to Abacus: A Comparison of P2P-TV Traffic Classifiers | p. 115 |
TCP Traffic Classification Using Markov Models | p. 127 |
K-Dimensional Trees for Continuous Traffic Classification | p. 141 |
Performance Measurements | |
Validation and Improvement of the Lossy Difference Aggregator to Measure Packet Delays | p. 155 |
End-to-End Available Bandwidth Estimation Tools, an Experimental Comparison | p. 171 |
On the Use of TCP Passive Measurements for Anomaly Detection: A Case Study from an Operational 3G Network | p. 183 |
Author Index | p. 199 |
Table of Contents provided by Ingram. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.