共 16 条
- [1] Madhukar A., Williamson C., A longitudinal study of P2P traffic classification, Proceedings of the 14th IEEE International Symposium on Modeling, Analysis, and Simulation, pp. 179-188, (2006)
- [2] Sen S., Spatscheck O., Accurate, scalable in-network identification of P2P traffic using application signatures, Proceedings of the 13th International Conference on World Wide Web, pp. 512-521, (2004)
- [3] Liu X.B., Yang J.H., Xie G.G., Automated mining of packet signatures for traffic identification at application layer with apriori algorithm, Journal on Communications, 29, 12, pp. 51-59, (2008)
- [4] Constantinous F., Mavrommatis P., Identifying known and unknown peer-to-peer traffic transport layer identification of P2P traffic, Proceedings of the Fifth IEEE International Symposium on Network Computing and Applications, pp. 93-102, (2006)
- [5] Wang J.S., Zhang Y., Connection pattern-based P2P application identification characteristic, Proceedings of the 2007 IFIP International Conference on Network and Parallel Computing Workshops, pp. 437-441, (2007)
- [6] Raffaele B., Marco C., Characterizing the network behavior of P2P traffic, Proceedings of the 2008 4th International Telecommunication Networking Workshop on QoS in Multiservice IP Networks, pp. 14-19, (2008)
- [7] Alshammari R., Zincir-Heywood A.N., Can encrypted traffic be identified without port numbers, IP addresses and payload inspection, Computer Networks, 6, 55, pp. 1326-1350, (2010)
- [8] Dusi M., Este A., Using GMM and SVM-based techniques for the classification of SSH-encrypted traffic, Proceedings of the 2009 IEEE International Conference on Communications, pp. 702-707, (2009)
- [9] Moore A.W., Zuev D., Internet traffic classification using bayesian analysis techniques, Proceedings of the 2005 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, pp. 50-60, (2005)
- [10] Yuan R., Li Z., An SVM-based machine learning method for accurate internet traffic classification, Information Systems Frontiers, 12, 2, pp. 149-156, (2012)