2010
DOI: 10.1109/tnet.2009.2031175
|View full text |Cite
|
Sign up to set email alerts
|

Googling the Internet: Profiling Internet Endpoints via the World Wide Web

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0

Year Published

2011
2011
2019
2019

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 33 publications
(20 citation statements)
references
References 11 publications
0
20
0
Order By: Relevance
“…traffic cluster) levels. Specifically, traffic classes include: (i) traffic cluster such as bulk or small transactions; (ii) application type such as game, browsing or chat; (iii) application protocol such as hypertext transfer protocol (HTTP), HTTP secure (HTTPS), file transfer protocol (FTP), domain name system (DNS), simple mail transfer protocol (SMTP), post office protocol (POP3), secure sockets layer (SSL) or secure shell (SSH); (iv) application software such as a specific FTP or BitTorrent client software; (v) fine‐grained traffic classification such as Facebook chat, Google search or Skype voice call; and anomaly class.…”
Section: A Multilateral Taxonomy Of Traffic Classification Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…traffic cluster) levels. Specifically, traffic classes include: (i) traffic cluster such as bulk or small transactions; (ii) application type such as game, browsing or chat; (iii) application protocol such as hypertext transfer protocol (HTTP), HTTP secure (HTTPS), file transfer protocol (FTP), domain name system (DNS), simple mail transfer protocol (SMTP), post office protocol (POP3), secure sockets layer (SSL) or secure shell (SSH); (iv) application software such as a specific FTP or BitTorrent client software; (v) fine‐grained traffic classification such as Facebook chat, Google search or Skype voice call; and anomaly class.…”
Section: A Multilateral Taxonomy Of Traffic Classification Methodsmentioning
confidence: 99%
“…Hybrid techniques received some attention with different combination approaches. Moreover, the literature shows few miscellaneous and graphical techniques that were less tracked.…”
Section: A Multilateral Taxonomy Of Traffic Classification Methodsmentioning
confidence: 99%
“…Other possible approaches can rely on developing well-crafted malicious third party applications, or using traffic sniffing tools when in presence of IEEE 802.11 unencrypted accesses. The latter can also allow to acquire information for forcing a target device via endpoint profiling through web search engines, such as Google (Trestian et al, 2010).…”
Section: Minimal Taxonomy-based Space Modellingmentioning
confidence: 99%
“…Using data from a CSP, Keralapura et al [12] showed that there exist distinct behavior patterns among mobile users. Trestian et al [29] characterized the relationship between user application interests and their mobility properties. On a large scale, there have been studies characterizing mobile traffic and user interactive behaviors on embedded applications with smart phones [31].…”
Section: Related Workmentioning
confidence: 99%