1 |
eDonkey, http://www.edonkey2000.com
|
2 |
T. Karagiannis, A. Broido, N. Brownlee, K.C. Claffy, and M. Faloutos, 'Is P2P Dying or just Hiding?,' IEEE Globecom, 2004
|
3 |
T. Karagiannis, A. Broido, M.Faloutos, and K.C. Claffy, 'Transport Layer Identification of P2P Traffic,' ACM Internet Measurement Conference, 2004
|
4 |
S. Ohzahata, Y. Hagiwara, M. Terada, and K Kawashima, 'A Traffic Identification Method and Evaluations for a Pure P2P Application,' Passive and Active Measurement Workshop, 2005
|
5 |
nProbe, http://www.ntop.org/nProbe.html
|
6 |
Tcpdump, http://www.tcpdump.org
|
7 |
Flow-tools, http://www.splintered.net/sw/flow-tools/
|
8 |
PeePop, http://www.peepop.net
|
9 |
NetFlow, http://www.cisco.com/warp/public/cc/pd/iosw/ioft/netlct/tech/napps_ wp.htm
|
10 |
S. Sen and J. Wang, 'Analyzing Peer-to-Peer Traffic Across Large Networks,' IEEE/ACM Transactions on Networking, vol. 12, no. 2, pp. 219-232, April 2004
DOI
ScienceOn
|
11 |
Clubbox, http://www.clubbox.co.kr
|
12 |
Enppy, http://enppy.entica.com
|
13 |
Packeteer, http://www.packeteer.com
|
14 |
S. Sen, O. Spatscheck, and D. Wang, 'Accurate, Scalable In-Network Identification of P2P Traffic Using Application Signatures,' ACM WWW, 2004
|
15 |
L. Plissonneau, J-L. Costeux, and P. Brown, 'Analysis of Peer-to-Peer Traffic on ADSL,' Passive and Active Measurement Workshop, 2005
|
16 |
T. Choi, C.Kim, S. Yoon, J. Park, B. Lee, H. Kim, H. Chung, and T. Jeong, 'Contentaware Internet Application Traffic Measurement and Analysis,' NOMS, 2004
|
17 |
A. Gerber, J. Houle, H. Nguyen, M. Roughan, and S. Sen, 'P2P, The Gorilla in the Cable,' National Cable & Telecommunications Association (NCTA) 2003 National Show, 2003
|