1 |
K. Xu, Z. Zhang, and S. Bhattacharya, "Profiling Internet Backbone Traffic: Behavior Models and Applications", ACM SIGCOMM, pp. 169-180, 2005.
|
2 |
Lan, K and Heidemann, J, "A measurement study of correlations of internet flow characteristics", Elsevier Computer Networks, 50(1), pp. 46-62, 2006.
DOI
ScienceOn
|
3 |
A. Moore, K. Papagiannaki, "Toward the Accurate Identification of Network Applications," Proc. PAM 2005, Boston, USA, 2005.
|
4 |
F. Gringoli, L. Salgarelli, M. Dusi, N. Cascarano, F. Risso, K. Claffy, "GT: picking up the truth from the ground for Internet traffic," ACM SIGCOMM Computer Communication Review, 39(4), Oct. 2009.
|
5 |
T. Karagiannis, A.Broido, M. Faloutsos, and kc claffy.Transport layer identification of P2P traffic. InACM/SIGCOMM IMC, 2004.
|
6 |
M. Baldi, A. Baldini, N. Cascarano, and F. Risso, "Service-based traffic classification: Principles and validation", Proc. of the IEEE 2009 Sarnoff Symposium, Princeton, NJ, USA, Mar. 2009.
|
7 |
Myung-Sup Kim, Young J.Won, James Won-Ki Hong, "Application-Level Traffic Monitoring and an Analysis on IP Networks", ETRI Journal, Vol. 27, No.1, pp. 22-42, 2005.
DOI
ScienceOn
|
8 |
S. Sen, J. Wang, "Analyzing peer-to-peer traffic across large networks", Internet Measurement Conference (IMC), Proc. Of the 2nd ACM SIGCOMM Workshop on Internet measurement, pp. 137-150, 2002.
|
9 |
Internet Assigned Numbers Authority list, http://www.iana.org/assignments/port-numbers
|
10 |
Cisco, NetFlow Services and Applications, White Paper, http://www.cisco.com/en/US/prod/collateral/iosswrel/ps6537/ps6555/ps6601/prod_white_paper0900aecd80406232.html.
|
11 |
Chen, B.C., Yegneswaran, V., Barford, P., Ramakrishnan, R., "Toward a Query Language for Network Attack Data", 22nd International Conference on Data Engineering Workshops (ICDEW'06), pp. 28-36. IEEE Press, New York, 2006
|
12 |
Bittorrent on http://www.bittorrent.com/
|
13 |
Fileguri on http://www.fileguri.com/
|
14 |
Internet Explorer on http://windows.microsoft.com/ko-KR/internet-explorer/downloads/ie
|
15 |
Nateon on http://nateonweb.nate.com/
|
16 |
Byung-Chul Park, Young J. Won, Myung-Sup Kim, James W. Hong, "Towards Automated Application Signature Generation for Traffic Identification," Proc. of the IEEE/IFIP Network Operations and Management Symposium (NOMS) 2008, Salvador, Bahia, Brazil, Apri. 7-11, pp. 160-167, 2008.
|
17 |
Sung-Ho Yoon, Jin-Wan Park, Young-Seok Oh, Jun-Sang Park, and Myung-Sup Kim, "Internet Application Traffic Classification Using Fixed IP-port," Proc. of the Asia-Pacific Network Operations and Management Symposium(APNOMS) 2009, LNCS5787, Jeju, Korea, Sep. 23-25, pp. 21-30, 2009.
|
18 |
V. Carela-Espanol, P. Barlet-Ros, M. Sole-Simo, A. Dainotti, W. de Donato, and A. Pescape, "K-Dimensional Trees for Continuous Traffic Classification," in Traffic Monitoring and Analysis: Second International Workshop, TMA 2010, Zurich, Switzerland, pp. 141, 2010.
|