[1] |
TRUONG P , GUILLEMIN F . Dynamic binary tree for hierarchical clustering of IP traffic[A]. IEEE Global Telecommunications Conference[C]. Washington,DC, 2007. 6-10.
|
[2] |
DU X , ZHOU Z , YANG Y J . Research of applying information entropy and clustering technique on network traffic analysis[A]. Computational Intelligence and Security[C]. Suzhou,China, 2008. 472-476.
|
[3] |
SON C , CHO S H , YOO J H . Volume traffic anomaly detection using hierarchical clustering[A]. Management Enabling the Future Internet for Changing Business and New Computing Services Lecture Notes in Computer Science[C]. 2009. 291-300.
|
[4] |
SHUKLA D B , CHANDEL G S . An approach for classification of network traffic on semi-supervised data using clustering techniques[A]. Nirma University International Conference on Engineering (NUiCONE)[C]. Ahmedabad, 2013. 1-6.
|
[5] |
WANG Y , XIANG Y , ZHANG J ,et al. Internet traffic classification using constrained clustering[A]. Parallel and Distributed Systems[C]. 2013. 1-4.
|
[6] |
PALNATY R P , RAO A . JCADS:semi-supervised clustering algorithm for network anomaly intrusion detection systems[A]. Advanced Computing Technologies (ICACT15th)[C]. Rajampet, 2013. 1-5.
|
[7] |
WANG Y , XIANG Y , ZHANG J . Network traffic clustering using Random Forest proximities[A]. IEEE International Conference on Communications (ICC)[C]. Budapest, 2013. 2058-2062.
|
[8] |
LU W , XUE L . A heuristic-based co-clustering algorithm for the internet traffic classification[A]. The 28th International Conference on Advanced Information Networking and Applications Workshops (WAINA)[C]. Victoria,BC, 2014. 49-54.
|
[9] |
CHIOU T W , TSAI S C , LIN Y B . Network security management with traffic pattern clustering[J]. Soft Computing, 2014,18: 1757-1770.
|
[10] |
JUVONEN A , SIPOLA T . Adaptive framework for network traffic classification using dimensionality reduction and clustering[A]. The 4th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)[C]. Petersburg, 2012. 274-279.
|
[11] |
ZHANG M , ZHANG H L , ZHANG B . Encrypted traffic classification based on an improved clustering algorithm[J]. Trustworthy Computing and Services Communications in Computer and Information Science, 2013,320: 124-131.
|
[12] |
PRESS W H , TEUKOLSKY S A , VETTERLING W T ,et al. Numerical Recipes in C[M]. London: Cambridge University PressPress, 1988.
|
[13] |
KARAGIANNIS T , PAPAGIANNAKI K , FALOUTSOS M . BLINC:multilevel traffic classification in the dark[J]. ACM SIGCOMM Computer Communication Review, 2005,35(4): 229-240.
|