Back to Results
First PageMeta Content
Videotelephony / Skype / Skype protocol / Network protocols / File sharing networks / NetBIOS / Peer-to-peer / Transmission Control Protocol / Secure Shell / Software / Computing / Voice over IP


Protocol Identification via Statistical Analysis (PISA) Black Hat 2007 Rohit Dhamankar and Rob King, TippingPoint Technologies Abstract A growing number of proprietary protocols are using end-to-end encryption to avoid
Add to Reading List

Document Date: 2014-12-16 19:06:37


Open Document

File Size: 578,17 KB

Share Result on Facebook

Company

Skype / Oracle / /

Country

United States / India / /

/

IndustryTerm

large processing / request-response protocol / eDonkey protocol / data communications / covert communications / particular protocol / zombie systems / Voice over IP / /

NaturalFeature

Shannon / /

Person

Rohit Dhamankar / Rob King / Shannon Entropy / /

Position

wise statistics professor / /

Technology

encryption / SNMP / Ethernet / LAN / broadband / HTTP protocol / request-response protocol / DNS / eDonkey protocol / Clustering algorithms / 137 Expected protocol / Peer-to-Peer / ASCII / particular protocol / K-means clustering algorithm / Voice over IP technologies / P2P / HTTP / encrypted P2P protocols / mp3 / KaZaa protocol / UDP / increasingly using encryption / little-endian / 2126.41329 Expected protocol / /

URL

www.theblackandwhiteball.co.uk/talk-realtime.php / http /

SocialTag