[1] Claffy K C. Internet traffic characterization. San Diego: University of California, 1994. [2] Sen S, Spatscheck O, Wang D. Accurate, scalable in-network identification of P2P traffic using application signatures//Proceedings of the 13th International Conference on World Wide Web. New York: ACM, 2004: 512-521. [3] Roughan M, Sen S, Spatscheck O, et al. Class-of-service mapping for QoS: a statistical signature-based approach to IP traffic classification//Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement. New York: ACM, 2004: 135-148. [4] Moore A, Papagiannaki K. Toward the accurate identification of network applications[M]. Berlin: Springer, 2005: 41-54. [5] Bernaille L, Teixeira R, Salamatian K. Early application identification//Proceedings of the 2006 ACM CoNEXT Conference. New York: ACM, 2006: 6. [6] Crotti M, Dusi M, Gringoli F, et al. Traffic classification through simple statistical fingerprinting//ACM SIGCOMM Computer Communication Review. New York: ACM, 2007: 5-16. [7] 马永立, 钱宗珏, 寿国础, 等. 机器学习用于网络流量识别[J]. 北京邮电大学学报, 2009, 32(1): 65-68. Ma Yongli, Qian Zongjue, Shou Guochu, et al. Network flow identification based on machine learning[J]. Journal of Beijing University of Posts and Telecommunication, 2009, 32(1): 65-68. [8] Fullmer M, Romig S. The OSU flow-tools package and CISCO NetFlow logs//Proceedings of the 14th USENIX Conference on System Administration. Berkeley: USENIX Association, 2000: 291-304. |