Network Forensic on Encrypted Peer-to-Peer VoIP Traffics and the Detection, Blocking, and Prioritization of Skype Traffics.
Chun-Ming LeungYuen-Yan ChanPublished in: WETICE (2007)
Keyphrases
- peer to peer
- load balancing
- peer to peer systems
- peer to peer networks
- overlay network
- network architecture
- object detection
- fully distributed
- resource discovery
- network traffic
- anomaly detection
- digital libraries
- computer networks
- ad hoc networks
- false alarms
- network structure
- detection method
- network security
- distributed computing
- video streaming
- false positives