Information Technology Reference
In-Depth Information
[4]
Freire, E.P., Ziviani, A., Salles, R.M.: Detecting Skype flowsin Web traffic. In: Network
Operations and Management Symposium, NOMS 2008, April 7-11, pp. 89-96. IEEE,
Los Alamitos (2008), doi:10.1109/NOMS.2008.4575121
[5]
Liberatore, M., Levine, B.N.: Inferring the source of encrypted HTTP connections. In:
Proceedings of the 13th ACM Conference on Computer and Communications Security
(CCS 2006), pp. 255-263. ACM, New York (2006)
[6]
Hopper, N., Vasserman, E.Y., Chan-Tin, E.: How much anonymitydoes network latency
leak? In: Proc. of the 14th ACM Conf. on Computer and Communications Security, CCS
2007 (2007)
[7]
Xu, K., Zhang, Z., Bhattacharyya, S.: Profiling internet backbone traffic: behavior models
and applications. SIGCOMM Comput. Commun. Rev. 35(4), 169-180 (2005)
[8]
Wright, C.V., Monrose, F., Masson, G.M.: On Inferring ApplicationProtocol Behaviors in
Encrypted Network Traffic. J. Mach. Learn. Res. 7, 2745-2769 (2006)
[9]
Karasaridis, A., Meier-Hellstern, K., Hoein, D.: Detection of DNS Anomalies using Flow
Data Analysis. In: Global TelecommunicationsConference, GLOBECOM 2006, November
27 -December 1, pp. 1-6. IEEE, Los Alamitos (2006), doi:0.1109/GLOCOM.2006.280
[10]
Born, K., Gustafson, D.: Detecting DNS Tunnels Using Character Frequency Analysis.
In: Proceedings of the 9th Annual Security Conference, LasVegas, NV, April 7-8 (2010)
[11]
van Leijenhorst, T., Lowe, D., Chin, K.-W.: On the Viability and Performance of DNS
Tunneling. In: The 5th International Conference on InformationTechnology and Applica-
tions (ICITA 2008), Cairns, Australia, June 23-26 (2008)
[12]
Nussbaum, L., Neyron, P., Richard, O.: On Robust Covert ChannelsInside DNS. Emerg-
ing Challenges for Security, Privacy and Trust. In: IFIPAdvances in Information and
Communication Technology. Springer, Boston (2009)
[13]
NSTX (October 2003),
http://nstx.sourceforge.net/
[14]
DNSCat (October 2004),
http://tadek.pietraszek.org/projects/DNScat/
[15]
Iodine (February 2010),
http://code.kryo.se/iodine/
[16]
DNS2TCP,
http://www.hsc.fr/ressources/outils/dns2tcp/index.html.en
[17]
Ozyman,
http://www.cship.info/mirror/dnstunnel/ozymandns_src0.1.tgz
[18]
Iperf,
http://sourceforge.net/projects/iperf/
[19]
Hping,
http://www.hping.org/
[20]
tshark,
http://www.wireshark.org/docs/man-pages/tshark.html
[21]
WireShark,
http://www.wireshark.org
Search WWH ::
Custom Search