{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,9]],"date-time":"2025-05-09T15:45:16Z","timestamp":1746805516789,"version":"3.40.5"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,6]]},"DOI":"10.1109\/icc.2007.1020","type":"proceedings-article","created":{"date-parts":[[2007,8,22]],"date-time":"2007-08-22T15:36:11Z","timestamp":1187796971000},"page":"6162-6168","source":"Crossref","is-referenced-by-count":25,"title":["Detecting HTTP Tunnels with Statistical Mechanisms"],"prefix":"10.1109","author":[{"given":"M.","family":"Crotti","sequence":"first","affiliation":[]},{"given":"M.","family":"Dusi","sequence":"additional","affiliation":[]},{"given":"F.","family":"Gringoli","sequence":"additional","affiliation":[]},{"given":"L.","family":"Salgarelli","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"Privacy Vulnerabilities in Encrypted HTTP Streams","author":"bissias","year":"2005","journal-title":"Proc Privacy Enhancing Technologies Workshop (PET 2005)"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/1080091.1080119"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/1129582.1129589"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028805"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/1064212.1064220"},{"key":"13","article-title":"Statistical Clustering of Internet Communications Patterns","volume":"35","author":"herna?ndez-campos","year":"2003","journal-title":"Computing Science and Statistics"},{"key":"14","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1007\/978-3-540-24668-8_21","article-title":"Flow Clustering Using Machine Learning Techniques","author":"mcgregor","year":"2004","journal-title":"Proc of the 5th Passive and Active Measurement Workshop (PAM"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/90.330413"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/90.392383"},{"year":"0","key":"21"},{"journal-title":"DNS tunnel","year":"0","author":"heinz","key":"3"},{"key":"20","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1145\/1030083.1030100","article-title":"Web tap: Detecting covert web traffic","author":"borders","year":"2004","journal-title":"CCS'04 Proceedings of the 11th ACM Conference on Computer and Communications Security"},{"journal-title":"GNU httptunnel","year":"0","author":"brinkhoff","key":"2"},{"key":"1","article-title":"Bypassing Firewalls: Tools and Techniques","author":"hill","year":"2000","journal-title":"12th Annual First Conference"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1080\/15427951.2004.10129096"},{"key":"7","first-page":"229","article-title":"SNORT: Lightweight Intrusion Detection for Networks","author":"roesch","year":"1999","journal-title":"LISA '99 Proceedings of the 13th USENIX Conference on Systems Administration"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(99)00112-7"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1198255.1198257"},{"journal-title":"The Linux Academy HTTP Tunnel","year":"0","author":"mills","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2006.1603387"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2004.1268997"}],"event":{"name":"2007 IEEE International Conference on Communications","start":{"date-parts":[[2007,6,24]]},"location":"Glasgow, Scotland","end":{"date-parts":[[2007,6,28]]}},"container-title":["2007 IEEE International Conference on Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4288670\/4288671\/04289691.pdf?arnumber=4289691","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,17]],"date-time":"2017-06-17T18:14:28Z","timestamp":1497723268000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4289691\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,6]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/icc.2007.1020","relation":{},"subject":[],"published":{"date-parts":[[2007,6]]}}}