نتایج جستجو برای: http traffic analysis
تعداد نتایج: 2996689 فیلتر نتایج به سال:
The use of IP traffic prediction techniques for DAMA TDMA protocols is investigated in this paper. The predicted traffic distribution is derived when the input traffic shows long-range dependence features. Furthermore, an equivalent bandwidth is calculated, which allows the wireless terminal to request a certain amount of bandwidth (slot duration) in terms of a target traffic loss probability. ...
This paper presents the design and implementation of Web Polygraph, a tool for benchmarking HTTP intermediaries. We discuss various challenges involved in simulating Web traffic and in developing a portable, high performance tool for generating such traffic. Polygraph’s simulation models, as well as our experiences with developing and running the benchmark, may be useful for Web proxy developer...
Anonymous communication networks like Tor partially protect the confidentiality of their users’ traffic by encrypting all intraoverlay communication. However, when the relayed traffic reaches the boundaries of the overlay network towards its actual destination, the original user traffic is inevitably exposed. At this point, unless end-toend encryption is used, sensitive user data can be snooped...
This paper describes the behaviour of individual Web users as well as aggregate HTTP traffic basing on actual traces taken from a transoceanic link between Japan and USA. The proposed model characterises the traffic at different levels, ranging from packets to Web pages. Thus, the study investigates the effects of aggregation on the heavy-tailed nature and the long range dependence present in t...
Censorship circumvention tools face an arms race as they work to evade increasingly motivated censors. Tools which have distinctive features can be detected and blocked by censors (e.g., Tor is actively targeted by censors around the world). As a result, there is increasing interest in disguising censorship circumvention traffic as benign protocols. SkypeMorph [1] and StegoTorus [2] are two plu...
In this paper we present a simulation study of HTTP traffic crossing a DiffServ domain. We consider both the cases where the reserved bandwidth is not exceeded by the offered traffic (overprovisioning) and where the assured traffic competes with the classic Best Effort class (underprovisioning). Simulation reported shows that DiffServ approach is able to protect the assured flows in the first c...
DiffServ policies have traditionally been applied to several types of Internet traffic like HTTP, FTP and CBR. DiffServ policies concerning HTTP traffic are commonly focused on preferential treatment of short flows, which are more sensitive to Internet delays and congestion, whereas long flows are penalized by the application of besteffort policies. This differentiation may produce low global p...
Network-based detection of botnet Command and Control communication is a difficult task if the traffic has a relatively low volume and if popular protocols, such as HTTP, are used to resemble normal traffic. We present a new network-based detection approach that is capable of detecting this type of Command and Control traffic in an enterprise network by estimating the trustworthiness of the tra...
background: iran is one of the countries with considerable road traffic injuries. pre-hospital interventions have an important role in preventing mortalities and disabilities caused by traffic accidents.the present study aimed to explore the barriers of pre-hospital care in traffic injuries in tehran, iran. methods: a qualitative content analysis approach was conducted based on 21 semi-structu...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید