|
[1] T. Karagiannis, K. Papagiannaki, and M. Faloutsos, “BLINC: multilevel traffic classification in the dark,” in Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications, Philadelphia, Pennsylvania, USA, 2005. [2] L. Bernaille, R. Teixeira, I. Akodkenou, A. Soule, and K. Salamatian, “Traffic classification on the fly,” SIGCOMM Computer Communication Review, vol. 36, 2006, pp. 23-26. [3] F. Constantinou and P. Mavrommatis, “Identifying Known and Unknown Peer-to-Peer Traffic,” Fifth IEEE International Symposium on Network Computing and Applications (NCA'06), Cambridge, MA, 2006, pp. 93-102. [4] L. Deri, M. Martinelli, T. Bujlow, and A. Cardigliano, “nDPI: Open-source high-speed deep packet inspection,” 2014 International Wireless Communications and Mobile Computing Conference (IWCMC), Nicosia, 2014, pp. 617-622. [5] O. Beaudoux and M. Beaudouin-Lafon, “OPENDPI: A Toolkit for Developing Document-Centered Environments,” in Enterprise Information Systems VII, C.-S. Chen, J. Filipe, I. Seruca, and J. Cordeiro, Eds., ed: Springer Netherlands, 2006, pp. 231-239. [6] C. S. Yang, M. Y. Liao, M. Y. Luo, S. M. Wang and C. E. Yeh, “A Network Management System Based on DPI,” 2010 13th International Conference on Network-Based Information Systems, Takayama, 2010, pp. 385-388. [7] X. Lu et al., “A Real Implementation of DPI in 3G Network,” 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, Miami, FL, 2010, pp. 1-5. [8] S. H. Lee, J. S. Park, S. H. Yoon and M. S. Kim, “High performance payload signature-based Internet traffic classification system,” 2015 17th Asia-Pacific Network Operations and Management Symposium (APNOMS), Busan, 2015, pp. 491-494. [9] Young-Hoon Goo, Kyu-Seok Shim, Su-Kang Lee and M. S. Kim, “Payload signature structure for accurate application traffic classification,” 2016 18th Asia-Pacific Network Operations and Management Symposium (APNOMS), Kanazawa, 2016, pp. 1-4. [10] F. Yu et al., “High speed deep packet inspection with hardware support,” PhD thesis, EECS Department, University of California at Berkeley, Berkeley, CA, 2006. [11] P. Tian, G. Xiaoyu, Z. Chenhui, J. Junchen, W. Hao, and L. Bin, "Tracking millions of flows in high speed networks for application identification," in INFOCOM, 2012 Proceedings IEEE, 2012, pp. 1647-1655. [12] Y. Ding, “A method of imbalanced traffic classification based on ensemble learning,” 2015 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC), Ningbo, 2015, pp. 1-4. [13] L. M. Nair and G. P. Sajeev, “Internet Traffic Classification by Aggregating Correlated Decision Tree Classifier,” 2015 Seventh International Conference on Computational Intelligence, Modelling and Simulation (CIMSim), Kuantan, 2015, pp. 135-140. [14] F. Ghofrani, A. Jamshidi and A. Keshavarz-Haddad, “Internet traffic classification using Hidden Naive Bayes model,” 2015 23rd Iranian Conference on Electrical Engineering, Tehran, 2015, pp. 235-240. [15] F. Ghofrani, A. Keshavarz-Haddad and A. Jamshidi, “Internet traffic classification using multiple classifiers,” 2015 7th Conference on Information and Knowledge Technology (IKT), Urmia, 2015, pp. 1-5. [16] S. Mongkolluksamee, V. Visoottiviseth and K. Fukuda, “Enhancing the Performance of Mobile Traffic Identification with Communication Patterns,” 2015 IEEE 39th Annual Computer Software and Applications Conference, Taichung, 2015, pp. 336-345. [17] V. Carela-Español, T. Bujlow, and P. Barlet-Ros, “Is Our Ground-Truth for Traffic Classification Reliable?,” in Passive and Active Measurement, vol. 8362, M. Faloutsos and A. Kuzmanovic, Eds., ed: Springer International Publishing, 2014, pp. 98-108. [18] Z. A. Qazi, J. Lee, T. Jin, G. Bellala, M. Arndt, and G. Noubir,“Application-Awareness in SDN,” in Proceedings of ACM SIGCOMM, vol. 43, no. 4. ACM, 2013, pp. 487–488. [19] T. Iwai and A. Nakao, “Adaptive mobile application identification through in-network machine learning,” 2016 18th Asia-Pacific Network Operations and Management Symposium (APNOMS), Kanazawa, 2016, pp. 1-6. [20] D. Plonka and P. Barford, “Flexible traffic and host profiling via dns rendezvous,” in Workshop on Securing and Trusting Internet Names (SATIN), ACM, April 2011. [21] M. Trevisan, I. Drago, M. Mellia and M. M. Munafò, "Towards web service classification using addresses and DNS," 2016 International Wireless Communications and Mobile Computing Conference (IWCMC), Paphos, 2016, pp. 38-43. [22] B. Hullar, S. Laki, and A. Gyorgy, "Efficient Methods for Early Protocol Identification," Selected Areas in Communications, IEEE Journal on, vol. 32, pp. 1907-1918, 2014. [23] F. Dehghani, N. Movahhedinia, M. R. Khayyambashi, and S. Kianian, "Real-Time Traffic Classification Based on Statistical and Payload Content Features," in Intelligent Systems and Applications (ISA), 2010 2nd International Workshop on, 2010, pp. 1-4. [24] T. Bujlow, T. Riaz, and J. M. Pedersen, "Classification of HTTP traffic based on C5.0 Machine Learning Algorithm," in Computers and Communications (ISCC), 2012 IEEE Symposium on, 2012, pp. 000882-000887. [25] Zhanyi Wang, "The Applications of Deep Learning on Traffic Identification". Available: https://www.blackhat.com/docs/us-15/materials/us-15-Wang-The-Applications-Of-Deep-Learning-On-Traffic-Identification-wp.pdf [26] Zhanyi Wang, "The Applications Of Deep Learning On Traffic Identification". Available: https://www.blackhat.com/docs/us-15/materials/us-15-Wang-The-Applications-Of-Deep-Learning-On-Traffic-Identification.pdf [27] Chi-Sung Chou, “Realization of Application Identification System Based on Statistical Signatures,” M.S. thesis, Institute of Communications Engineering, Tsing Hua University, Hsinchu, Taiwan, 2015. [28] N. F. Huang, G. Y. Jai, Chih-Hao Chen and H. C. Chao, “On the cloud-based network traffic classification and applications identification service,” 2012 International Conference on Selected Topics in Mobile and Wireless Networking, Avignon, 2012, pp. 36-41. [29] C. a. o. i. affiliates. Snort. Available: https://www.snort.org/ [30] M. Roesch, "Snort: Lightweight Intrusion Detection for Networks," in LISA, 1999, pp. 229-238. [31] M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann, and I. H. Witten, "The WEKA data mining software: an update," SIGKDD Explorations Newsletter, vol. 11, pp. 10-18, 2009. [32] L. Breiman, "Random Forests," Machine Learning, vol. 45, pp. 5-32, 2001/10/01 2001. [33] J. J. Rodriguez, L. I. Kuncheva, and C. J. Alonso, "Rotation Forest: A New Classifier Ensemble Method," Pattern Analysis and Machine Intelligence, IEEE Transactions on, vol. 28, pp. 1619-1630, 2006. [34] Weka. RandomCommittee. Available: http://wiki.pentaho.com/display/DATAMINING/RandomCommittee [35] N. F. Huang, I. J. Liao, H. W. Liu, S. J. Wu and C. S. Chou, “A dynamic QoS management system with flow classification platform for software-defined networks,” 2015 8th International Conference on Ubi-Media Computing (UMEDIA), Colombo, 2015, pp. 72-77. [36] N. F. Huang, S. J. Wu, I. J. Liao and C. W. Lin, “Bandwidth distribution for applications in slicing network toward SDN on vCPE framework,” 2016 18th Asia-Pacific Network Operations and Management Symposium (APNOMS), Kanazawa, 2016, pp. 1-4. [37] Nancy Chinchor, “MUC-4 Evaluation Metrics,” in Proceedings of the Fourth Message Understanding Conference, 1992, pp. 22–29. |