Next: About this document ...
Up: The Power of Slicing
Previous: Acknowledgments
- 1
-
Ipmon - packet trace analysis.
https://ipmon.sprintlabs.com/ packstat/ packetoverview.php.
- 2
-
N. Brownlee, C. Mills, and G. Ruth.
Traffic flow measurement: Architecture.
RFC 2722, Oct. 1999.
- 3
-
N. Brownlee and D. Plonka.
IP flow information export (ipfix).
IETF working group.
- 4
-
Cooperative association for internet data analysis.
https://www.caida.org/.
- 5
-
S. Chaudhuri, R. Motwani, and V. Narasayya.
Random sampling for histogram construction: How much is enough?
In SIGMOD, 1998.
- 6
-
C. Cranor, T. Johnson, O. Spatschek, and V. Shkapenyuk.
Gigascope: A stream database for network applications.
In SIGMOD, June 2003.
- 7
-
The DAG project.
https://dag.cs.waikato.ac.nz/.
- 8
-
N. Duffield, C. Lund, and M. Thorup.
Charging from sampled network usage.
In IMW, Nov. 2001.
- 9
-
N. Duffield, C. Lund, and M. Thorup.
Properties and prediction of flow statistics from sampled packet
streams.
In IMW, Nov. 2002.
- 10
-
C. Estan, K. Keys, D. Moore, and G. Varghese.
Building a better netflow.
In Proceedings of the ACM SIGCOMM, Aug. 2004.
- 11
-
C. Estan and G. Varghese.
New directions in traffic measurement and accounting: Focusing on the
elephants, ignoring the mice.
In ACM Trans. Comput. Syst., Aug. 2003.
- 12
-
A. Feldmann, A. Greenberg, C. Lund, N. Reingold, J. Rexford, and F. True.
Deriving traffic demands for operational ip networks: Methodology and
experience.
In SIGCOMM, Aug. 2000.
- 13
-
T. Karagiannis, A. Broido, M. Faloutsos, and K. claffy.
Transport layer identification of p2p traffic.
In IMC, Oct. 2004.
- 14
-
K. Keys, D. Moore, R. Koga, E. Lagache, M. Tesch, and k claffy.
The architecture of CoralReef: an Internet traffic monitoring
software suite.
In PAM, Apr. 2001.
- 15
-
R. R. Kompella and C. Estan.
The power of slicing in internet flow measurement.
Technical report, UCSD, May 2005.
- 16
-
K. McCloghrie and M. T. Rose.
Rfc 1213, Mar. 1991.
- 17
-
Cisco NetFlow.
https://www.cisco.com /warp /public /732 /Tech /netflow.
- 18
-
V. Paxson.
Bro: a system for detecting network intruders in real-time.
In Computer Networks, volume 31, 1999.
- 19
-
D. Plonka.
Flowscan: A network traffic flow reporting and visualization tool.
In USENIX LISA, Dec. 2000.
- 20
-
M. Roesch.
Snort - lightweight intrusion detection for networks.
In USENIX LISA, 1999.
- 21
-
M. Roughan, S. Sen, O. Spatscheck, and N. Duffield.
Class-of-service mapping for QoS: A statistical signature-based
approach to IP traffic classification.
In IMC, Oct. 2004.
- 22
-
Sampled NetFlow.
https://www.cisco.com/ univercd/cc/td/
doc/product/software/ios120/ 120newft/120limit/120s/120s11/ 12s_sanf.htm.
Ramana Rao Kompella
2005-08-12