|
[1] Thomas Karagiannis, Konstantina Papagiannaki, and Michalis Faloutsos, "BLINC: multilevel traffic classification in the dark," presented at the Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications, Philadelphia, Pennsylvania, USA, October 2005, pp. 229-240. [2] Center for Applied Internet Data Analysis. CoralReef Software Suite. Available: https://www.caida.org/tools/measurement/coralreef/ [3] Laurent Bernaille, Renata Teixeira, Ismael Akodkenou, Augustin Soule, and Kave Salamatian, "Traffic classification on the fly," SIGCOMM Comput. Commun. Rev., vol. 36, April 2006 pp. 23-26. [4] F. Constantinou and P. Mavrommatis, "Identifying Known and Unknown Peer-to-Peer Traffic," in Network Computing and Applications, 2006. NCA 2006. Fifth IEEE International Symposium on, Kendal Square, Cambridge, MA USA, July 2006, pp. 93-102. [5] L. Deri, M. Martinelli, T. Bujlow, and A. Cardigliano, "nDPI: Open-source high-speed deep packet inspection," in Wireless Communications and Mobile Computing Conference (IWCMC), 2014 International, Nicosia, Cyprus, August 2014, pp. 617-622. [6] Olivier Beaudoux and Michel Beaudouin-Lafon, "OPENDPI: A TOOLKIT FOR DEVELOPING DOCUMENT-CENTERED ENVIRONMENTS," in Enterprise Information Systems VII, Chin-Sheng Chen, Joaquim Filipe, Isabel Seruca, and José Cordeiro, Eds., ed: Springer Netherlands, January 2006, pp. 231-239. [7] Pan Tian, Guo Xiaoyu, Zhang Chenhui, Jiang Junchen, Wu Hao, and Liu Bin, "Tracking millions of flows in high speed networks for application identification," in INFOCOM, 2012 Proceedings IEEE, Orlando, FL, USA, March 2012, pp. 1647-1655. [8] B. Hullar, S. Laki, and A. Gyorgy, "Efficient Methods for Early Protocol Identification," Selected Areas in Communications, IEEE Journal on, vol. 32, November 2014, pp. 1907-1918. [9] F. Dehghani, N. Movahhedinia, M. R. Khayyambashi, and S. Kianian, "Real-Time Traffic Classification Based on Statistical and Payload Content Features," in Intelligent Systems and Applications (ISA), 2010 2nd International Workshop on, Wuhan, China, May 2010, pp. 1-4. [10] T. Bujlow, T. Riaz, and J. M. Pedersen, "Classification of HTTP traffic based on C5.0 Machine Learning Algorithm," in Computers and Communications (ISCC), 2012 IEEE Symposium on, Cappadocia, Turkey, July 2012, pp. 000882-000887. [11] T. T. T. Nguyen and G. Armitage, "A survey of techniques for internet traffic classification using machine learning," Communications Surveys & Tutorials, IEEE, vol. 10, January 2009, pp. 56-76. [12] T. Bujlow, T. Riaz, and J. M. Pedersen, "A method for classification of network traffic based on C5.0 Machine Learning Algorithm," in Computing, Networking and Communications (ICNC), 2012 International Conference on, Maui, Hawaii, USA, January 2012, pp. 237-241. [13] S. Zander and G. Armitage, "Practical machine learning based multimedia traffic classification for distributed QoS management," in Local Computer Networks (LCN), 2011 IEEE 36th Conference on, Bonn, Germany, October 2011, pp. 399-406. [14] Yu Jin, Nick Duffield, Jeffrey Erman, Patrick Haffner, Subhabrata Sen, and Zhi-Li Zhang, "A Modular Machine Learning System for Flow-Level Traffic Classification in Large Networks," ACM Trans. Knowl. Discov. Data, vol. 6, March 2012, pp. 1-34. [15] Huang Nen-Fu, Jai Gin-Yuan, Chen Chih-Hao, and Chao Han-Chieh, "On the cloud-based network traffic classification and applications identification service," in Mobile and Wireless Networking (iCOST), 2012 International Conference on Selected Topics in, Avignon, France, July 2012, pp. 36-41. [16] Marcin Pietrzyk, Jean-Laurent Costeux, Guillaume Urvoy-Keller, and Taoufik En-Najjary, "Challenging statistical classification for operational usage: the ADSL case," presented at the Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference, Chicago, Illinois, USA, November 2009, pp. 122-135. [17] Suchul Lee, Hyunchul Kim, Dhiman Barman, Sungryoul Lee, Chong-Kwon Kim, Ted Kwon, et al., "NeTraMark: a network traffic classification benchmark," SIGCOMM Comput. Commun. Rev., vol. 41, January 2011, pp. 22-30. [18] W. De Donato, Pescape, X, A., and A. Dainotti, "Traffic identification engine: an open platform for traffic classification," Network, IEEE, vol. 28, April 2014, pp. 56-64. [19] G. Aceto, A. Dainotti, W. De Donato, and A. Pescape, "PortLoad: Taking the Best of Two Worlds in Traffic Classification," in INFOCOM IEEE Conference on Computer Communications Workshops , 2010, San Diego, CA, USA, March 2010, pp. 1-5. [20] Alberto Dainotti, Antonio Pescapé, and Carlo Sansone, "Early Classification of Network Traffic through Multi-classification," in Traffic Monitoring and Analysis. vol. 6613, Jordi Domingo-Pascual, Yuval Shavitt, and Steve Uhlig, Eds., ed: Springer Berlin Heidelberg, 2011, pp. 122-135. [21] A. Dainotti, A. Pescape, and K. C. Claffy, "Issues and future directions in traffic classification," Network, IEEE, vol. 26, January 2012, pp. 35-40. [22] Valentín Carela-Español, Tomasz Bujlow, and Pere Barlet-Ros, "Is Our Ground-Truth for Traffic Classification Reliable?," in Passive and Active Measurement. vol. 8362, Michalis Faloutsos and Aleksandar Kuzmanovic, Eds., ed: Springer International Publishing, 2014, pp. 98-108. [23] Haitao He, Xiaonan Luo, Feiteng Ma, Chunhui Che, and Jianmin Wang, "Network traffic classification based on ensemble learning and co-training," Science in China Series F: Information Sciences, vol. 52, February 2009, pp. 338-346. [24] Jagan Mohan Reddy and Chittaranjan Hota, "P2P traffic classification using ensemble learning," presented at the Proceedings of the 5th IBM Collaborative Academia Research Exchange Workshop, New Delhi, India, October 2013 pp. 1-4. [25] Deng Shengxiong, Luo Jiangtao, Liu Yong, Wang Xiaoping, and Yang Junchao, "Ensemble learning model for P2P traffic identification," in Fuzzy Systems and Knowledge Discovery (FSKD), 2014 11th International Conference on, Xiamen, China, August 2014, pp. 436-440. [26] Mark Hall, Eibe Frank, Geoffrey Holmes, Bernhard Pfahringer, Peter Reutemann, and Ian H. Witten, "The WEKA data mining software: an update," SIGKDD Explor. Newsl., vol. 11, June 2009, pp. 10-18. [27] Leo Breiman, "Bagging predictors," Machine Learning, vol. 24, August 1996, pp. 123-140. [28] Weka. RandomCommittee. Available: http://wiki.pentaho.com/display/DATAMINING/RandomCommittee [29] Ho Tin Kam, "The random subspace method for constructing decision forests," Pattern Analysis and Machine Intelligence, IEEE Transactions on, vol. 20, August 1998, pp. 832-844. [30] Leo Breiman, "Random Forests," Machine Learning, vol. 45, October 2001, pp. 5-32. [31] J. J. Rodriguez, L. I. Kuncheva, and C. J. Alonso, "Rotation Forest: A New Classifier Ensemble Method," Pattern Analysis and Machine Intelligence, IEEE Transactions on, vol. 28, October 2006, pp. 1619-1630. [32] Weka. MultiScheme. Available: http://wiki.pentaho.com/display/DATAMINING/MultiScheme [33] Xue Yibo, Wang Dawei, and Zhang Luoshi, "Traffic classification: Issues and challenges," in Computing, Networking and Communications (ICNC), 2013 International Conference on, San Diego, USA, January 2013, pp. 545-549. [34] Cisco. Snort. Available: https://www.snort.org/ [35] Martin Roesch, "Snort: Lightweight Intrusion Detection for Networks," in Large Installation System Administration (LISA), 1999 13th Systems Administration Conference on, Seattle, Washington, USA, November 1999, pp. 229-238. [36] Claudia Beleites, Ute Neugebauer, Thomas Bocklitz, Christoph Krafft, and Jürgen Popp, "Sample size planning for classification models," Analytica Chimica Acta, vol. 760, January 2013, pp. 25-33.
|