Check out the new USENIX Web site. next up previous
Next: About this document ... Up: The Power of Slicing Previous: Acknowledgments

Bibliography

1
Ipmon - packet trace analysis.
https://ipmon.sprintlabs.com/ packstat/ packetoverview.php.

2
N. Brownlee, C. Mills, and G. Ruth.
Traffic flow measurement: Architecture.
RFC 2722, Oct. 1999.

3
N. Brownlee and D. Plonka.
IP flow information export (ipfix).
IETF working group.

4
Cooperative association for internet data analysis.
https://www.caida.org/.

5
S. Chaudhuri, R. Motwani, and V. Narasayya.
Random sampling for histogram construction: How much is enough?
In SIGMOD, 1998.

6
C. Cranor, T. Johnson, O. Spatschek, and V. Shkapenyuk.
Gigascope: A stream database for network applications.
In SIGMOD, June 2003.

7
The DAG project.
https://dag.cs.waikato.ac.nz/.

8
N. Duffield, C. Lund, and M. Thorup.
Charging from sampled network usage.
In IMW, Nov. 2001.

9
N. Duffield, C. Lund, and M. Thorup.
Properties and prediction of flow statistics from sampled packet streams.
In IMW, Nov. 2002.

10
C. Estan, K. Keys, D. Moore, and G. Varghese.
Building a better netflow.
In Proceedings of the ACM SIGCOMM, Aug. 2004.

11
C. Estan and G. Varghese.
New directions in traffic measurement and accounting: Focusing on the elephants, ignoring the mice.
In ACM Trans. Comput. Syst., Aug. 2003.

12
A. Feldmann, A. Greenberg, C. Lund, N. Reingold, J. Rexford, and F. True.
Deriving traffic demands for operational ip networks: Methodology and experience.
In SIGCOMM, Aug. 2000.

13
T. Karagiannis, A. Broido, M. Faloutsos, and K. claffy.
Transport layer identification of p2p traffic.
In IMC, Oct. 2004.

14
K. Keys, D. Moore, R. Koga, E. Lagache, M. Tesch, and k claffy.
The architecture of CoralReef: an Internet traffic monitoring software suite.
In PAM, Apr. 2001.

15
R. R. Kompella and C. Estan.
The power of slicing in internet flow measurement.
Technical report, UCSD, May 2005.

16
K. McCloghrie and M. T. Rose.
Rfc 1213, Mar. 1991.

17
Cisco NetFlow.
https://www.cisco.com /warp /public /732 /Tech /netflow.

18
V. Paxson.
Bro: a system for detecting network intruders in real-time.
In Computer Networks, volume 31, 1999.

19
D. Plonka.
Flowscan: A network traffic flow reporting and visualization tool.
In USENIX LISA, Dec. 2000.

20
M. Roesch.
Snort - lightweight intrusion detection for networks.
In USENIX LISA, 1999.

21
M. Roughan, S. Sen, O. Spatscheck, and N. Duffield.
Class-of-service mapping for QoS: A statistical signature-based approach to IP traffic classification.
In IMC, Oct. 2004.

22
Sampled NetFlow.
https://www.cisco.com/ univercd/cc/td/ doc/product/software/ios120/ 120newft/120limit/120s/120s11/ 12s_sanf.htm.


Ramana Rao Kompella 2005-08-12