[1] |
IANA[EB/OL]. .
|
[2] |
SEN S , SPATSCHECK O , WANG D . Accurate, scalable in network identification of P2P traffic using application signatures[A]. Proceedings of the 13th international conference on World Wide Web[C]. New York, USA, 2004.512-521.
|
[3] |
KARAGIANNIS T , BROIDO A , BROWNLEE N , et al. Is P2P dying or just hiding?[A]. Proceedings of the 47th annual IEEE Global Tele-communications Conference[C]. Dallas, USA, 2004.1532-1538.
|
[4] |
HU C C , YI T , CHEN X F . et al. Per-flow queueing by dynamic queue sharing[A]. Proceedings of the 26th IEEE International Conference on Computer Communications[C]. Anchorage, Alaska, 2007.1613-1621.
|
[5] |
SOMMER R , PAXSON V . Enhancing byte-levelnetwork intrusion detection signatures with context[A]. Proceedings of the 10th ACM Conference on Computer and Communications Decurity (CCS 2003)[C]. Chicago, USA, 2003.262-271.
|
[6] |
SMTICH R , ESTAN C , JHA S . XFA: faster signaturematching with extended automata[A]. Proceedings of the 2008 IEEE Symposium on Security and Privacy (sp 2008)[C]. Oakland, USA, 2008.187-201.
|
[7] |
JAMES E , CARLA B , CATHERINE Behavioral authentication of server flows[A]. Proceedings of the 19th Annual Computer Security Applications Conference[C]. Oakland, USA, 2003.46-55.
|
[8] |
王一鹏, 云晓春, 张永铮, 李书豪 . 基于主动学习和 SVM 方法的网络协议识别技术[J]. 通信学报, 2013,34(10):135-142. WANG Y P , YUN X C , ZHANG Y Z , LI S H . Network protocol iden-tification based on activelearning and SVM algorithm[J]. Journal of Communications, 2013,34(10):135-142.
|
[9] |
AULD T , MOORE ANDREW W , STEPHEN F . Bayesian neural net-works for Internet traffic classification[J]. IEEE Trans Neural Networks, 2007,18(1):223-239.
|
[10] |
YANG B H , HOU G D , RUAN L Y , et al. SMILER:towards proacti-cal online traffic classification[A]. Proceedings of the 2011 ACM/IEEE Seventh Symposium on Architectures for Networking and Communications Systems[C]. DC, USA, 2011.178-188.
|
[11] |
THOMAS K , KONSTANTINA P , MICHALIS F . BLINC: Multilevel traffic classification in the dark[A]. Proceedings of the 2005 Confer-ence on Applications, Technologies, Architectures, and Protocols for Computer Communications[C]. New York, USA, 2005.229-240.
|
[12] |
ANDREW M , KONSTANTINA P . Towards the accurate identification of network applications[A]. Proceedings of 6th International Work-shop, PAM 2005[C]. New York, USA, 2005.50-60.
|
[13] |
LI C L , XUE Y B , et al. HMC: A novel mechanism for identifying encrypted P2P thunder traffic[A]. Proceedings of Global Telecommu-nications Conference (GLOBECOM 2010)[C]. Miami, USA, 2010.1-5.
|
[14] |
XU K , ZHANG Z L , BHATTACHARYYA S . Profiling Internet back-bone traffic: behavior models and applications[A]. Proceedings of the 2005 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM'05)[C]. New York, USA, 2005.169-180.
|
[15] |
JIN Y , SHARAFUDDIN E , ZHANG Z L . Unveiling core net-work-wide communication patterns through application traffic activity graph decomposition[A]. Proceedings of the Eleventh International Joint Conference on Measurement and Modeling of Computer Sys-tems (SIGMETRICS '09)[C]. New York, NY, USA, 2009.49-60.
|
[16] |
JIN Y , DUFFIELD N , et al. Can't see forest through the trees?under-standing mixed network traffic graphs from application class distribution[A]. Proceedings of the 9th Workshop on Mining and Learning with Graphs (MLG 2011)[C]. San Diego, California, USA, 2011.20-21.
|
[17] |
SHI X G , CHAU C K , CHIU D M . Space-efficient tracking of net-work-wide flow correlations[A]. Proceedings of INFO-COM'2011[C]. Shanghai, China, 2011.11-15.
|
[18] |
RABINER L R . A tutorial on hidden Markov models and selected applications in speech recognition[J]. Proceedings of the IEEE, 1889,77(2):257-286.
|
[19] |
谢柏林, 余顺争 . 基于应用层协议分析的应用层实时主动防御系统[J]. 计算机学报, 2011,34(3):452-463. XIE B L , YU S Z . Application layer real-time proactive defense sys-tem based on application layer protocol analysis[J]. Chinese Journal of Computers, 2011,34(3):452-463.
|
[20] |
KOTISANTISS. B . Supervised machine learning: a review of classifi-cation techniques[J]. Informatica, 2007,31(3):249-268.
|
[21] |
nDPI[EB/OL]. .
|