[1] |
MADHUKAR A , WILLIAMSON C . A longitudinal study of P2P traffic classification[A]. Proceedings of the 14th IEEE International Symposium on Modeling,Analysis,and Simulation[C]. 2006. 179-188.
|
[2] |
SEN S , SPATSCHECK O . Accurate,scalable in-network identification of P2P traffic using application signatures[A]. Proceedings of the 13th International Conference on World Wide Web[C]. 2004. 512-521.
|
[3] |
LIU X B , YANG J H , XIE G G . Automated mining of packet signatures for traffic identification at application layer with apriori algorithm[J]. Journal on Communications, 2008,29(12): 51-59.
|
[4] |
CONSTANTINOUS F , MAVROMMATIS P . Identifying known and unknown peer-to-peer traffc transport layer identification of P2P traffic[A]. Proceedings of the Fifth IEEE International Symposium on Network Computing and Applications[C]. 2006. 93-102.
|
[5] |
WANG J S , ZHANG Y . Connection pattern-based P2P application identification characteristic[A]. Proceedings of the 2007 IFIP International Conference on Network and Parallel Computing Workshops[C]. 2007. 437-441.
|
[6] |
RAFFAELE B , MARCO C . Characterizing the network behavior of P2P traffic[A]. Proceedings of the 2008 4th International Telecommunication Networking Workshop on QoS in Multiservice IP Networks[C]. 2008. 14-19.
|
[7] |
ALSHAMMARI R , ZINCIR-HEYWOOD A N . Can encrypted traffic be identified without port numbers,IP addresses and payload inspection?[J]. Computer Networks, 2010,6(55): 1326-1350.
|
[8] |
DUSI M , ESTE A . Using GMM and SVM-based techniques for the classification of SSH-encrypted traffic[A]. Proceedings of the 2009 IEEE International Conference on Communications[C]. 2009. 702-707.
|
[9] |
MOORE A W , ZUEV D . Internet traffic classification using bayesian analysis techniques[A]. Proceedings of the 2005 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems[C]. 2005. 50-60.
|
[10] |
YUAN R , LI Z , An SVM-based machine learning method for accurate internet traffic classification[J]. Information Systems Frontiers, 2012,12(2): 149-156.
|
[11] |
JUN L , SHUNYI Z , Active P2P traffic identification technique[A]. Proceedings of the 2007 International Conference on Computational Intelligence and Security[C]. 2007. 37-41.
|
[12] |
LIU F , LI Z T . Research on Server Role Based P2P Nodes Identification Methods[D]. Wuhan:Huazhong University, 2010.
|
[13] |
QUINLAN J R.C4 . 5 Programs for Machine Learning[M]. Morgan Kaufmann Publishers, 1993.
|
[14] |
LU G , ZHANG H L . P2P traffic identification[J]. Journal of Software, 2011,22(6): 1281-1298.
|
[15] |
LU X , DUAN H , Identification of P2P traffic based on the content redistribution characteristic[A]. Proceedings of 2007 International Symposium on Communications and Information Technologies[C]. 2007. 596-601.
|
[16] |
L7-filter[EB/OL]..2012.
|