References
- K. Jegers and M. Wiberg, "Pervasive Gaming in the Everyday World," IEEE Pervasive Computing, vol. 5, 2006, pp.78-85.
- S. McCreary and K. Claffy, "Trends in Wide Area IP Traffic Patterns: A View from Ames Internet Exchange," Proc. 13th ITC Specialist Seminar on Measurement and Modeling of IP Traffic, Sept. 2000, pp. 1-11.
- L. Liang, Z. Sun, and H Cruickshank, "Relative QoS Optimization for Multiparty Online Gaming in DiffServ Networks," IEEE Commun. Mag., vol. 43, May 2005, pp. 75-83. https://doi.org/10.1109/MCOM.2005.1453426
- Game genres. http://en.wikipedia.org/wiki/Game_genres.
- G. Armitage, M. Claypool, and P. Branch, Networking and Online Games: Understanding and Engineering Multiplayer Internet Game, John Wiley and Sons, 2006, pp. 150-173.
- Game chart. http://www.gamechart.co.kr/.
- A. Kind et al., "Advanced Network Monitoring Brings Life to the Awareness Plane," IEEE Commun. Mag., vol. 46, Oct. 2008, pp. 140-146.
- V. Paxson, "Bro: A System for Detecting Network Intruders in Real-Time," Computer Networks, vol. 31, no. 23-24, 1999, pp. 2435-2463. https://doi.org/10.1016/S1389-1286(99)00112-7
- S. Sen, O. Spatscheck, and D. Wang, "Accurate, Scalable In-Network Identification of P2P Traffic Using Application Signatures," Proc. 13th Int. Conf. World Wide Web, 2004, pp. 512-521.
- M.S. Kim, Y.J. Won, and J.W.K. Hong, "Application-Level Traffic Monitoring and an Analysis on IP Networks," ETRI J., vol. 27, no. 1, 2005, pp. 22-42. https://doi.org/10.4218/etrij.05.0104.0040
- J. Erman, M. Arlitt, and A. Mahanti, "Internet Traffic Classification Using Clustering Algorithms," Proc. ACM SIGCOMM Workshop Mining Network Data, 2006, pp. 281-286.
- T. Karagiannis et al., "Transport Layer Identification of P2P Traffic," Proc. 4th ACM SIGCOMM Conf. Internet Measurement, 2004, pp. 121-134.
- A. Madhukar and C. Williamson, "A Longitudinal Study of P2P Traffic Classification," Proc.14th IEEE Int. Symp. Modeling, Analysis, and Simulation, Sept. 2006, pp. 179-188.
- T. Karagiannis, K. Papagiannaki, and M. Faloutsos, "BLINC: Multilevel Traffic Classification in the Dark," Proc. ACM SIGCOMM, Aug. 2005, pp. 229-240.
- A.W. Moore and D. Zuev, "Internet Traffic Classification Using Bayesian Analysis Techniques," Proc. SIGMETRICS, June 2005, pp. 50-60.
- A.W. Moore, "Discriminators for Use in Flow-Based Classification," Technical Report, Intel Research, Cambridge, 2005.
- M.S. Borella, "Source Models of Network Game Traffic," Computer Commun., vol. 23, no. 4, Feb. 2000, pp. 403-410. https://doi.org/10.1016/S0140-3664(99)00197-8
- J. Farber, "Network Game Traffic Modelling," Proc. 1st Workshop Network and System Support for Games, Bruanschweig, Germany, 2002, pp. 53-57.
- T. Henderson and S. Bhatti, "Modeling User Behaviour in Networked Games," Proc. 9th ACM Int. Conf. Multimedia, 2001, pp. 212-220.
- T. Lang, P. Branch, and G. Armitage, "A Synthetic Traffic Model for Quake3," Proc. ACM SIGCHI Int. Conf. Advances in Computer Entertainment Technol., Singapore, June 2004.
- W.C. Feng, F. Chang, and J. Walpole, "A Traffic Characterization of Popular On-line Games," IEEE/ACM Trans. Networking, vol. 13, no. 3, 2005, pp. 488-500. https://doi.org/10.1109/TNET.2005.850221
- T. Henderson and S. Bhatti, "Networked Games: A QoS-Sensitive Application for QoS-Insensitive Users?" Proc. ACM SIGCOMM Workshop on Revisiting IP QoS: What Have We Learned, Why Do We Care? 2003, pp. 141-147.
- A. Dainotti, A. Pescape, and G. Ventre, "A Packet-Level Traffic Model of Starcraft," Proc. HOT-P2P 2nd Int. Workshop Hot Topics in Peer-to-Peer Systems, San Diego, USA, 2005, pp. 33-42.
- K.T. Chen, P. Huang, and C.L. Lei, "Game Traffic Analysis: An MMORPG Perspective," Computer Networks, vol. 50, no. 16, 2006, pp. 3002-3023. https://doi.org/10.1016/j.comnet.2005.11.005
- J. Kim et al., "Traffic Characteristics of a Massively Multi-player Online Role Playing Game," Proc. NetGames, Oct. 2005, pp. 1-8.
- Internet Assigned Numbers Authority (IANA) port number list. http://www.iana.org/assignments/port-numbers.
- J. But et al., "Evaluating Machine Learning Methods for Online Game Traffic Identification," Proc. 5th ACM SIGCOMM Workshop on Network and System Support for Games, Technical Report 060410C, CAIA, Apr. 2006.
- D.J. Parish et al., "Using Packet Size Distributions to Identify Real-Time Networked Applications," IEE Commun., vol. 150, Aug. 2003, pp. 221-227. https://doi.org/10.1049/ip-com:20030411
- K. Tsutomu et al., "Traffic Identification for Dependable VoIP," NEC Technical J., vol. 1, no. 3, 2006, pp. 17-20.
- M. Crotti et al., "Traffic Classification through Simple Statistical Fingerprinting," ACM SIGCOMM Computer Commun. Review, vol. 37, no. 1, Jan. 2007, pp. 5-16. https://doi.org/10.1145/1198255.1198257
- N. Williams, S. Zander, and G. Armitage, "A Preliminary Performance Comparison of Five Machine Learning Algorithms for Practical IP Traffic Flow Classification," ACM SIGCOMM Computer Commun. Review, vol. 36, no. 5, Oct. 2006, pp. 5-16. https://doi.org/10.1145/1163593.1163596
- Gundam-Online (GO). http://gundam.netmarble.net/.
- KartRider. http://kart.nexon.com/.
- Stracraft. http://www.blizzard.co.kr/starcraft/.
- Sudden Attack (SA). http://suddenattack.netmarble.net/.
- World of Warcraft (WoW). http://www.worldofwarcraft.com/.
- Dungeon and Fighter (D&F). http://df.hangame.com/.
- Maple Story (M.S). http://maplestory.nexon.net/.
- Lineage II. http://www.lineage2.co.kr/.
- L.J. Gleser and D.S. Moore, "The Effect of Dependence on Chi-Squared and Empiric Distribution Tests of Fit," Annals of Statistics, vol. 11, no. 4, 1983, pp. 1100-1108. https://doi.org/10.1214/aos/1176346324
- N. Williams, S. Zander, and G. Armitage, "Evaluating Machine Learning Algorithms for Automated Network Application Identification," Technical Report 060401B, CAIA, Swinburne Univ., Apr. 2006.
- M. Kantardzic, Data Mining: Concepts, Methods, and Algorithms, Wiley-IEEE Press, 2003.
- Perl programming language. http://www.perl.org/.
Cited by
- 통계 시그니쳐 기반 트래픽 분석 시스템의 성능 향상 vol.c18, pp.4, 2011, https://doi.org/10.3745/kipstc.2011.18c.4.243
- Characterizing the gaming traffic of World of Warcraft: From game scenarios to network access technologies vol.26, pp.1, 2010, https://doi.org/10.1109/mnet.2012.6135853
- 통계 정보 기반 트래픽 분석 방법론의 성능 향상 vol.2, pp.8, 2010, https://doi.org/10.3745/ktccs.2013.2.8.335
- 트래픽 수집지점에서 발생하는 TCP패킷중복 및 역전문제 해결 방법 vol.b39, pp.6, 2010, https://doi.org/10.7840/kics.2014.39b.6.350
- From the Hands of an Early Adopter’s Avatar to Virtual Junkyards: Analysis of Virtual Goods’ Lifetime Survival vol.9, pp.7, 2010, https://doi.org/10.3390/app9071268