Information Technology Reference
In-Depth Information
[4] Freire, E.P., Ziviani, A., Salles, R.M.: Detecting Skype flowsin Web traffic. In: Network
Operations and Management Symposium, NOMS 2008, April 7-11, pp. 89-96. IEEE,
Los Alamitos (2008), doi:10.1109/NOMS.2008.4575121
[5] Liberatore, M., Levine, B.N.: Inferring the source of encrypted HTTP connections. In:
Proceedings of the 13th ACM Conference on Computer and Communications Security
(CCS 2006), pp. 255-263. ACM, New York (2006)
[6] Hopper, N., Vasserman, E.Y., Chan-Tin, E.: How much anonymitydoes network latency
leak? In: Proc. of the 14th ACM Conf. on Computer and Communications Security, CCS
2007 (2007)
[7] Xu, K., Zhang, Z., Bhattacharyya, S.: Profiling internet backbone traffic: behavior models
and applications. SIGCOMM Comput. Commun. Rev. 35(4), 169-180 (2005)
[8] Wright, C.V., Monrose, F., Masson, G.M.: On Inferring ApplicationProtocol Behaviors in
Encrypted Network Traffic. J. Mach. Learn. Res. 7, 2745-2769 (2006)
[9] Karasaridis, A., Meier-Hellstern, K., Hoein, D.: Detection of DNS Anomalies using Flow
Data Analysis. In: Global TelecommunicationsConference, GLOBECOM 2006, November
27 -December 1, pp. 1-6. IEEE, Los Alamitos (2006), doi:0.1109/GLOCOM.2006.280
[10] Born, K., Gustafson, D.: Detecting DNS Tunnels Using Character Frequency Analysis.
In: Proceedings of the 9th Annual Security Conference, LasVegas, NV, April 7-8 (2010)
[11] van Leijenhorst, T., Lowe, D., Chin, K.-W.: On the Viability and Performance of DNS
Tunneling. In: The 5th International Conference on InformationTechnology and Applica-
tions (ICITA 2008), Cairns, Australia, June 23-26 (2008)
[12] Nussbaum, L., Neyron, P., Richard, O.: On Robust Covert ChannelsInside DNS. Emerg-
ing Challenges for Security, Privacy and Trust. In: IFIPAdvances in Information and
Communication Technology. Springer, Boston (2009)
[13] NSTX (October 2003), http://nstx.sourceforge.net/
[14] DNSCat (October 2004),
http://tadek.pietraszek.org/projects/DNScat/
[15] Iodine (February 2010), http://code.kryo.se/iodine/
[16] DNS2TCP,
http://www.hsc.fr/ressources/outils/dns2tcp/index.html.en
[17] Ozyman,
http://www.cship.info/mirror/dnstunnel/ozymandns_src0.1.tgz
[18] Iperf, http://sourceforge.net/projects/iperf/
[19] Hping, http://www.hping.org/
[20] tshark, http://www.wireshark.org/docs/man-pages/tshark.html
[21] WireShark, http://www.wireshark.org
 
Search WWH ::




Custom Search