Zobrazeno 1 - 10
of 12
pro vyhledávání: '"Elisa Boschi"'
Autor:
Elisa Boschi, Brian Trammell
Publikováno v:
IEEE Communications Magazine. 49:89-95
The IP Flow Information Export protocol (IPFIX) is an IETF Proposed Standard for the export of information about network flows in IP networks. It is the logical successor to Cisco Net- Flow version 9, upon which it is based. The key innovations of IP
Publikováno v:
ACM SIGCOMM Computer Communication Review. 40:5-11
In recent years, academic literature has analyzed many attacks on network trace anonymization techniques. These attacks usually correlate external information with anonymized data and successfully de-anonymize objects with distinctive signatures. How
Autor:
Iakovos S. Venieris, Francesca Rubina Gaudino, Georgios V. Lioudakis, Giuseppe Bianchi, Dimitra I. Kaklamani, Elisa Boschi
Passive network monitoring is very useful for the operation, maintenance, control and protection of communication networks, while in certain cases it provides the authorities with the means for law enforcement. Nevertheless, the flip side of monitori
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::79c0f1983f067bd94296e320e25c0aa7
https://doi.org/10.4018/978-1-61520-975-0.ch022
https://doi.org/10.4018/978-1-61520-975-0.ch022
Autor:
Christian Callegari, Peter Dorfinger, Gregorio Procissi, Brian Trammell, Elisa Boschi, Dominik Schatzmann
Publikováno v:
Traffic Monitoring and Analysis ISBN: 9783642203046
TMA
TMA
We present a novel method for identifying Skype clients and supernodes on a network using only flow data, based upon the detection of certain Skype control traffic. Flow-level identification allows long-term retrospective studies of Skype traffic as
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::eff681f1e1c1b3efda07aaa434df3500
Publikováno v:
INFOCOM
We present an efficient network measurement primitive that measures the rate of variations, or unique values for a given characteristic of a traffic flow. The primitive is widely applicable to a variety of data reduction and pre-analysis tasks at
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::083977631250462d0d8d50c76dcbc732
Publikováno v:
NDA
Network operators are reluctant to share traffic data due to security and privacy concerns. Consequently, there is a lack of publicly available traces for validating and generalizing the latest results in network and security research. Anonymization
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::7da0416533c987ad594af28e5727cf43
http://arxiv.org/abs/0903.4266
http://arxiv.org/abs/0903.4266
Publikováno v:
Active and Programmable Networks ISBN: 9783642009716
IWAN
IWAN
For network users and service providers it is important to validate the compliance of network services to the guarantees given in Service Level Agreements (SLAs). This is particularly challenging in inter-domain environments. In this paper, we propos
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ec016d16ae39c28cb2efbe41c44e41c3
https://doi.org/10.1007/978-3-642-00972-3_1
https://doi.org/10.1007/978-3-642-00972-3_1
Autor:
Elisa Boschi
Publikováno v:
NDA
The last few years have seen increasing attention paid to privacy issues and data protection requirements with respect to network traffic monitoring. The increasing spread of the use of information technology and the Internet among the general public
Publikováno v:
SAINT Workshops
IP flow data provides input for accounting, traffic engineering and security applications. The storage of flow data is required to allow off-line processing, archiving, and sharing of traffic traces. Currently this is achieved with a variety of propr
Autor:
Giuseppe Bianchi, E.A. Koutsoloukas, Fabio Ricciato, F. Oppedisano, M. Petraschek, Dimitra I. Kaklamani, C. Schmoll, Georgios V. Lioudakis, Elisa Boschi
Publikováno v:
PIMRC
Passive network monitoring is required for the operation and maintenance of communication networks as well as to detect frauds and attacks. Typically, raw packet-level traffic traces are collected using suitable traffic probe devices and fed to monit