Acknowledgement
Supported by : 한국연구재단
References
- Internet Assigned Numbers Authority (IANA), Retrieved Jun., 15., 2012., from http://www.iana.org/assignments/service-names -port-numbers/service-names-port-numbers.xml
- A. W. Moore and K. Papagiannaki, "Toward the accurate identification of network applications," Passive and Active Network Measurement, Lecture Notes in Computer Science Volume 3431, 2005, pp 41-54
- A. Madhukar and C. Williamson, "A longitudinal study of p2p traffic classification," in Proc. IEEE Int. Symposium on Modeling, Analysis, and Simulation, Sept. 2006. pp. 179-188.
- S. Sen, O. Spatscheck, and D. Wang, "Accurate, scalable in-network identification of p2p traffic using application signatures," in Proc. ACM Int. Conf. World Wide Web, New York, USA, May. 2004. pp. 512-521.
- SSH FAQ, Retrieved Jun., 15., 2012., from http://www.rz.uni-karlsruhe.de/ ig25/ssh-faq/.
- D. J. Barett and R. E. Silverman, SSH, The Secure Shell: The Definitive Guide, O'Reilly, 2001.
- RFC4254, Retrieved Jun., 20., 2012., from http://tools.ietf.org/html/rfc4254.
- RFC4252 Retrieved Jun., 20., 2012., from http://tools.ietf.org/html/rfc4252.
- RFC4253 Retrieved Jun., 20., 2012., from http://tools.ietf.org/html/rfc4253.
- F. Dijkstra, A. Friedl, Specification of advanced features for a multi-domain monitoring infrastructure, Feb. 2010. from http://www.geant.net/Media Centre/Media Library/Pages/Deliverables.aspx.
- P. Haffner, S. Sen, O. Spatscheck, and D. Wang, "ACAS: Automated construction of application signatures," in Proc. ACM SIGCOMM Workshop on Mining Network Data, New York, USA, Aug. 2005. pp. 197 -202.
- W. Li, M. Canini, A. W. Moore, and R. Bolla, "Efficient application identification and the temporal and spatial stability of classification schema," Computer Networks, vol. 53, no. 6, pp. 790-809, Apr. 2009. https://doi.org/10.1016/j.comnet.2008.11.016
- L. Bernaille and R. Teixeira, "Early recognition of encrypted applications," in Proc. Int. Conf. Passive and Active Measurement, Apr. 2007. pp. 165-175.
- C. Wright, F. Monrose, and G. M. Masson, "HMM profiles for network traffic classification," in Proc. ACM Workshop on Visualization and Data Mining for Computer Security, Oct. 2004. pp. 9-15.
- C. V. Wright, F. Monrose, and G. M. Masson, "On inferring application protocol behaviors in encrypted network traffic," J. Mach. Learn. Res., vol. 7, pp. 2745-2769, 2006.
- F. Palmieri and U. Fiore, "A nonlinear, recurrence-based approach to traffic classification," Computer Networks, vol. 53, no. 6, pp. 761-773, Apr. 2009 https://doi.org/10.1016/j.comnet.2008.12.015
- C. Fraley and A. E. Raftery, "How Many Clusters? Which Clustering Method? Answers Via Model-Based Cluster Analysis," The Comput. J., vol. 41, no. 08, pp. 578-588, 1998. https://doi.org/10.1093/comjnl/41.8.578
- Hyunuk Kim, Ha Yoon Song, "A Study on Characterizing the Human Mobility Pattern with EM(Expectation Maximization) Clustering", Korea Computer Congress, vol.38, no. 1(B), pp. 222-225, Jun. 2011.
- Sung-ho Yoon, Myung-sup Kim, "A Study of Performance Improvement of Internet Application Traffic Identification using Flow Correlation", THE JOURNAL OF KOREA INFORMATION AND COMMUNICATIONS SOCIETY, vol. 36, no. 6, pp. 600-607, Jun. 2011. https://doi.org/10.7840/KICS.2011.36B.6.600
- Sang-woo Lee, Hyun-shin Lee,Mi-jung Choi, Myung-sup Kim, "Real-time Identification of Skype Application Traffic using Behavior Analysis", THE JOURNAL OF KOREA INFORMATION AND COMMUNICATIONS SOCIETY, vol. 36, no. 2, pp. 131-140, Feb. 2011. https://doi.org/10.7840/KICS.2011.36B.2.131
- WireShark, Retrieved Aug., 20., 2012., from http://www.wireshark.org/
- WinPcap, Retrieved Aug., 20., 2012., from http://www.winpcap.org/
- TCPDUMP, Retrieved Aug., 20., 2012., from http://www.tcpdump.org/
- WEKA, Retrieved Aug., 20., 2012., from http://www.cs.waikato.ac.nz/ml/weka/