Login / Signup
Tunnel Hunter: Detecting application-layer tunnels with statistical fingerprinting.
Maurizio Dusi
Manuel Crotti
Francesco Gringoli
Luca Salgarelli
Published in:
Comput. Networks (2009)
Keyphrases
</>
application layer
network layer
end to end
cross layer
physical layer
transport layer
bandwidth allocation
overlay network
neural network
low complexity
ddos attacks