[1] Logg C. Characterization of the traffic between SLAC and the Internet. . http://www.slac.stanford.edu/comp/net/slac-netflow/html/SLAC-netflow.html.
[2] Moore D, Keys K, Koga R, et al. Claffy CoralReef software suite as a tool for system and network administrators//Burgess M. Proceedings of the LISA 2001 15th Systems Administration Conference. San Diego: USENIX, 2001: 133-144.
[3] San S, Spatscheck O, Wang D. Accurate, scalable in-network identification of P2P traffic using application signatures//Proceeding of the 13th Internation World Wide Web Conference. NY: ACM Press, 2004: 512-521.
[4] Haffner P, Sen S, Spatscheck O, et al. ACAS: automated construction of application signatures//ACM SIGCOMM Workshop on MineNet 2005. Philadelphia: ACM Press, 2005: 197-202.
[5] Cisco IOS Documentation. Network-based application recognition and distributed network-based application recognition. . http://www.cisco.com/univercd/cc/?td?/?doc?/?product?/?software?/?ios122?/?122newft/122t/122t8/dtnbarad.htm.
[6] Moore A W, Zuev D. Internet traffic classification using Bayesian analysis techniques//ACM SIGMETRICS. New York: ACM Press, 2005: 50-60.
[7] Auld T, Moore A W, Gull S F. Bayesian neural networks for Internet traffic classification[J]. IEEE Trans on Neural Network, 2007, 18(1):223-239.
[8] Okabe T, Kitamura T, Shizuno T. Statistical traffic identification method based on flow-level behavior for fair VoIP service//IEEE Workshop on VoIP Management and Security. Vancouver: IEEE Press, 2006: 35-40.
[9] Karagiannis T, Papagiannaki K, Faloutsos M. BLINC: multilevel traffic classification in the dark//ACM SIGCOMM 2005. Philadelphia: ACM Press, 2005: 229-240.
[10] Webb A R. Statistical pattern recognition[M]. 2nd ed. England: Wiley, 2004: 161-162. |