2011 IEEE International Conference on Communications (ICC) 2011
DOI: 10.1109/icc.2011.5963290
|View full text |Cite
|
Sign up to set email alerts
|

Taking a Peek at Bandwidth Usage on Encrypted Links

Abstract: In this paper we describe a practical yet effective technique to monitor the amount of bytes that several classes of protocols, such as peer-to-peer, e-mail, etc., transmit over encrypted virtual links, such as IPSec tunnels. The experiments described in this paper demonstrate that our regression-treebased bandwidth estimator is effective enough to create usage models inherently robust to changes in path, number of users and type of protocols multiplexed over the encrypted link. In other words, our experimenta… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 17 publications
(11 reference statements)
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?