The identification of network applications through observation of associated packet traffic flows is vital to the areas of network management and surveillance. Currently popular m...
Nigel Williams, Sebastian Zander, Grenville J. Arm...
Some in the research community perceive the Internet Engineering Task Force (IETF) as ossified and see the difficulty in standardizing new protocols as an indication that there is...
Internet data remains one of the basic components of computer science network research. Despite its necessity, available data is limited by legal, social, and technical constraint...
Colleen Shannon, David Moore, Ken Keys, Marina Fom...
Abstract-- This paper describes a system for automated generation of attack signatures for network intrusion detection systems. Our system applies pattern-matching techniques and p...
Traditional application programming interfaces for transport protocols make a virtue of hiding most internal per-connection state. We argue that this informationhiding precludes m...
Jeffrey C. Mogul, Lawrence S. Brakmo, David E. Low...