References
- D.E. Taylor, "Survey and Taxonomy of Packet Classification Techniques," ACM Computing Surveys, Vol.37, No.3, pp.238-275, Sep., 2005. https://doi.org/10.1145/1108956.1108958
- V. Paxson, "Bro: A System for Detecting Network Intruders in Real-Time," Proceedings of the 7th USENIX Security Symposium, pp.31-51, Jan., 1998.
- H. Dreger, A. Feldmann, M. Mai, V. Paxson, and R. Sommer, "Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection," Proceedings of the 15th USENIX Security Symposium, pp.257-272, Aug., 2006.
- "Internet Assigned Numbers Authority (IANA)," http://www.iana.org/assignments/port-numbers/.
- M. Crotti, M. Dusi, F. Gringoli, and L. Salgarelli, "Traffic Classification through Simple Statistical Fingerprinting," ACM SIGCOMM Computer Communication Review, Vol.37, No.1, pp.5-16, Jan., 2007. https://doi.org/10.1145/1198255.1198257
- L. Bernaille, R. Teixeira, and K. Salamation, "Early Application Identification," Proceedings of the 2006 ACM CoNEXT Conference, 2006.
- M. Tai, S. Ata, and I. Oka, "Environment-Independent Online Real-Time Traffic Identification," Proceedings of the 4th International Conference on Networking and Services, pp.230-235, 2008. https://doi.org/10.1109/ICNS.2008.44
- T.T. Nguyen and G. Armitage, "Training on Multiple Sub-Flows to Optimise the Use of Machine Learning Classifiers in Real-World IP Networks," Proceedings of the IEEE 31th Conference on Local Computer Networks, pp.369-376, Nov., 2006. https://doi.org/10.1109/LCN.2006.322122
- T.T. Nguyen and G. Armitage, "Clustering to Assist Supervised Machine Learning for Real-Time IP Traffic Classification," Proceedings of the IEEE International Conference on Communications, pp.5857-5862, May, 2008. https://doi.org/10.1109/ICC.2008.1095
- D. Johnson, C. Perkins, and J. Arkko, "Mobility Support in IPv6," Internet RFC 3775, Jun., 2004.
- V. Devarapalli, R. Wakikawa, A. Petrescu, and P. Thubert, "Network Mobility (NEMO) Basic Support Protocol," Internet RFC 3963, Jan., 2005.
- T.T. Nguyen and G. Armitage, "A Survey of Techniques for Internet Traffic Classification Using Machine Learning," IEEE Communications Surveys and Tutorials, Vol.10, No.4, pp.56-76, 4th Quarter 2008. https://doi.org/10.1109/SURV.2008.080406
- "Cpmonitor," http://www.cysols.com/.
- J. Shlens, "A Tutorial on Principal Component Analysis," Systems Neurobiology Laboratory, Salk Institute for Biological Studies, 2005.
- C.V. Wright, F. Monrose, and G.M. Masson, "Using Visual Motifs to Classify Encrypted Traffic," Proceedings of the International Workshop on Visualization for Computer Security, pp.41-50, Nov., 2006. https://doi.org/10.1145/1179576.1179584
- L. Bernaille, R. Teixeira, I. Akodkenou, A. Soule, and K. Salamation, "Traffic Classification on the Fly," ACM SIGCOMM Computer Communication Review, Vol.36, No.2, pp.23-26, Apr., 2006. https://doi.org/10.1145/1129582.1129589
- A.W. Moore, D. Zuev, and M.L. Crogan, "Discriminators for Use in Flow-Based Classification," Technical Report, Aug., 2005.
- A.K. Jain, M.N. Murty, and P.J. Flynn, "Data Clustering: A Review," ACM Computing Surveys, Vol.31, No.3, pp.264-323, Sep., 1999. https://doi.org/10.1145/331499.331504
- J.H. Ward, "Hierarchical Grouping to Optimize an Objective Function," Journal of the American Statistical Association, Vol.58, No.301, pp.236-244, 1963. https://doi.org/10.2307/2282967
Cited by
- Proxy based seamless connection management method in mobile cloud computing vol.16, pp.4, 2013, https://doi.org/10.1007/s10586-013-0249-8