[1] |
BERNAILLE L , TEIXEIRA R , AKODKENKUT I , et al. Traffic classification on the fly[J]. ACM SIGCOMM Computer Communica-tion Review, 2006,36(2):23-26.
|
[2] |
CROTTI M , DUSI M , GRINFOLI F , et al. Traffic classification through simple statistical fingerprinting[J]. ACM SIGCOMM Computer Communication Review, 2007,37(1):1-16.
|
[3] |
SEN S , SPATSCHECK O , WANG D M . Accurate, scalable in-network identification of P2P traffic using application signatures[A]. Proceed-ings of WWW2004[C]. New York, 2004. 512-521.
|
[4] |
Application layer packet classifier for linux[EB/OL]. , http://17-filter.Sourceforge.net, 2012.
|
[5] |
PARK BC , WON YJ , KIM MS , et al. Towards automated application signature generation for traffic identification[A]. Proceeding of the IEEE/IFIP Network Operations and Management Symposium[C]. Salvador da Bahia, 2008. 160-167.
|
[6] |
WANG Y , XIANG Y , ZHOU W L , et al. Generating regular expression signatures for network traffic classification in trusted network man-agement[J]. Journal of Network and Computer Applications, 2011,17:1-9.
|
[7] |
YE M J , XU K , WU J P , et al. Autosig-automatically generating sig-natures for applications[A]. Proceeding of the IEEE Ninth Interna-tional Conference on Computer and Information Technology[C]. Xia-men, China, 2009. 104-109.
|
[8] |
赵咏, 姚秋林, 张志斌 等. TPCAD:一种文本类多协议特征自动发现方法[J]. 通信学报, 2009,30(10A):28-35. ZHAO Y , YAO Q L , ZHANG Z B , et al. TPCAD: a text-oriented multi-protocol inference approach[J]. Journal on Communications, 2009,30(10A):28-35.
|
[9] |
刘兴彬, 杨建华, 谢高岗 等. 基于Apriori算法的流量识别特征自动提取方法[J]. 通信学报, 2008,29(12):51-59. LIU X B , YANG J H , XIE G G , et al. Automated mining of packet signatures for traffic identification at application layer with Apriori algorithm[J]. Journal on Communications, 2008,29(12):51-59.
|
[10] |
龙文, 马坤, 辛阳 等. 适用于协议特征提取的关联规则改进算法[J]. 电子科技大学学报, 2010,39(2):302-305. LONG W , MA K , XIN Y , et al. Improved association rules algorithm for protocol signatures extracting[J]. Journal of University of Elec-tronic Science and Technology of China, 2010,39(2):302-305.
|
[11] |
王变琴, 余顺争 . 一种自适应网络应用特征发现方法[J]. 通信学报, 2013,34(3):127-137. WANG B Q , YU S Z . Adaptive extraction method of network applica-tion signatures[J]. Journal on Communications, 2013,34(3):127-137.
|
[12] |
ZHANG M W , LIU D P . Scalable and accurate application signature discovery[A]. Proceeding of the IEEE Pacific-Asia Workshop on Com-putational Intelligence and Industrial Application[C]. 2008. 482-487.
|
[13] |
MA J , LEVCHENKO K , KREIBICH C , et al. Unexpected means of protocol inference[A]. Proceeding of the 6th ACM SIGCOMM Con-ference on Internet Measurement[C]. New York, NY: ACM, 2006:313-326.
|
[14] |
李伟明, 张爱芳, 刘建财 等. 网络协议的自动化模糊测试漏洞挖掘方法[J]. 计算机学报, 2011,34(2):242-254. LI W M , ZHANG A F , LIU J C , et al. Automatic network protocol fuzz testing and vulnerability discovering method[J]. Chinese Journal of Computers, 2011,34(2):242-254.
|
[15] |
MCGREGOR A , HALL M , LORIER P , et al. Flow clustering using machine learning techniques[A]. Proceedings of PAM'04[C]. Antibes Juan-les-Pins, France, 2004. 205-214.
|
[16] |
ZANDER S , NGUYEN T , ARMITAGE G . Automated traffic classifi-cation and application identification using machine learning[A]. Pro-ceeding of LCN'05[C]. Sydney, Australia, 2005.
|
[17] |
ERMAN J , ARLITT M ,and MAHANTI A . Traffic classification clustering algorithms[A]. Proceedings of SIGMETRICS'06 (Mine-Net)[C]. Pisa, Italy, 2006. 281-286.
|
[18] |
董仕, 王岗 . 基于UDP流量的P2P流媒体流量识别算法研究[J]. 通信学报, 2012,33(12):25-34. DONG S , WANG G . Research on P2P streaming media identification based on UDP[J]. Journal on Communications, 2012,33(12):25-34.
|
[19] |
MOORE A W , ZUEV D . Discriminators for Use in Flow-based Classi-fication[R]. Intel Research, Cambridge, 2005.
|
[20] |
BERNAILLE L , TEIXEIRA R , AKODKENOU I , et al. Traffic classi-fication on the fly[J]. ACM SIGCOMM Computer Communication Review, 2006,36(2):23-26.
|
[21] |
BERNAILLE L , TEIXEIRA R , SALAMTIAN K . Early application identification[A]. Proceedings of CoNEXT'06[C], Lisboa, Portugal, 2006.
|
[22] |
JAIN A K , DUBES R C . Algorithms for clustering data[M]. Pren-tice-Hall, Inc, 1988.
|
[23] |
DUMPSTER A P , PAIRD N M , RUBIN D B . Maximum likelihood from incomplete data via the EM algorithm[J]. Journal of the Royal Statistical Society, 1977,39(1):1-38.
|
[24] |
ESTER M , KRIEGEL H P , SANDER J , et al. A density-based algo-rithm for discovering clusters in large spatial database with noise[A]. Proceedings of the International Conference on Knowledge Discovery in Databases and Data Mining[C]. Portland, Oregon, 1996. 226-231.
|
[25] |
GUHA S , RASTOGI R , SHIM K . ROCK: a robust clustering algo-rithm for categorical attributes[J]. Information System, 2000,25(5):345-366.
|
[26] |
WEKAattributes[EB/OL]. . http://www.cs.waikato.ac.nz/~ml/weka/index.html.
|