A Classifiable Sub-Flow Selection Method for Traffic Classification in Mobile IP Networks |
Satoh, Akihiro
(Graduate School of Information Sciences, Tohoku University)
Osada, Toshiaki (Research Institute of Electrical Communication, Tohoku University) Abe, Toru (Cyberscience Center, Tohoku University) Kitagata, Gen (Research Institute of Electrical Communication, Tohoku University) Shiratori, Norio (Research Institute of Electrical Communication, Tohoku University) Kinoshita, Tetsuo (Research Institute of Electrical Communication, Tohoku University) |
1 | D.E. Taylor, "Survey and Taxonomy of Packet Classification Techniques," ACM Computing Surveys, Vol.37, No.3, pp.238-275, Sep., 2005. DOI ScienceOn |
2 | V. Paxson, "Bro: A System for Detecting Network Intruders in Real-Time," Proceedings of the 7th USENIX Security Symposium, pp.31-51, Jan., 1998. |
3 | J. Shlens, "A Tutorial on Principal Component Analysis," Systems Neurobiology Laboratory, Salk Institute for Biological Studies, 2005. |
4 | C.V. Wright, F. Monrose, and G.M. Masson, "Using Visual Motifs to Classify Encrypted Traffic," Proceedings of the International Workshop on Visualization for Computer Security, pp.41-50, Nov., 2006. DOI |
5 | L. Bernaille, R. Teixeira, I. Akodkenou, A. Soule, and K. Salamation, "Traffic Classification on the Fly," ACM SIGCOMM Computer Communication Review, Vol.36, No.2, pp.23-26, Apr., 2006. DOI |
6 | H. Dreger, A. Feldmann, M. Mai, V. Paxson, and R. Sommer, "Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection," Proceedings of the 15th USENIX Security Symposium, pp.257-272, Aug., 2006. |
7 | A.W. Moore, D. Zuev, and M.L. Crogan, "Discriminators for Use in Flow-Based Classification," Technical Report, Aug., 2005. |
8 | A.K. Jain, M.N. Murty, and P.J. Flynn, "Data Clustering: A Review," ACM Computing Surveys, Vol.31, No.3, pp.264-323, Sep., 1999. DOI ScienceOn |
9 | J.H. Ward, "Hierarchical Grouping to Optimize an Objective Function," Journal of the American Statistical Association, Vol.58, No.301, pp.236-244, 1963. DOI |
10 | "Internet Assigned Numbers Authority (IANA)," http://www.iana.org/assignments/port-numbers/. |
11 | M. Crotti, M. Dusi, F. Gringoli, and L. Salgarelli, "Traffic Classification through Simple Statistical Fingerprinting," ACM SIGCOMM Computer Communication Review, Vol.37, No.1, pp.5-16, Jan., 2007. DOI ScienceOn |
12 | T.T. Nguyen and G. Armitage, "Clustering to Assist Supervised Machine Learning for Real-Time IP Traffic Classification," Proceedings of the IEEE International Conference on Communications, pp.5857-5862, May, 2008. DOI |
13 | L. Bernaille, R. Teixeira, and K. Salamation, "Early Application Identification," Proceedings of the 2006 ACM CoNEXT Conference, 2006. |
14 | M. Tai, S. Ata, and I. Oka, "Environment-Independent Online Real-Time Traffic Identification," Proceedings of the 4th International Conference on Networking and Services, pp.230-235, 2008. DOI |
15 | T.T. Nguyen and G. Armitage, "Training on Multiple Sub-Flows to Optimise the Use of Machine Learning Classifiers in Real-World IP Networks," Proceedings of the IEEE 31th Conference on Local Computer Networks, pp.369-376, Nov., 2006. DOI |
16 | D. Johnson, C. Perkins, and J. Arkko, "Mobility Support in IPv6," Internet RFC 3775, Jun., 2004. |
17 | V. Devarapalli, R. Wakikawa, A. Petrescu, and P. Thubert, "Network Mobility (NEMO) Basic Support Protocol," Internet RFC 3963, Jan., 2005. |
18 | T.T. Nguyen and G. Armitage, "A Survey of Techniques for Internet Traffic Classification Using Machine Learning," IEEE Communications Surveys and Tutorials, Vol.10, No.4, pp.56-76, 4th Quarter 2008. DOI |
19 | "Cpmonitor," http://www.cysols.com/. |