[1] Cisco visual network index: forecast and methodology, 2012-2017. http://www.cisco.com/c/en/us/solutions/collateral/service-provider/ip-ngn-ip-next-generation-network/white_paper_c11-481360.html[2] 胡婷,勇,等.网络流量分类方法的比较研究 [J]. 桂林电子科技大学学报,2010, 30(3): 216-219.HU Ting, WANG Yong, TAO Xiao Ling. Comparisonresearch on the methods of networktraffic classification [J]. Journal of Guilin University of Electronic Technology, 2010, 30(3): 216-219.[3] TAKESHITA K, KUROSAWA T, TSUJINO M, et al. Evaluation of HTTP video classification method using flow group information [C]∥Proceedings of 14th International Telecommunications Network Strategy and Planning Symposium, 2010: 1-6.[4] 董育宁,王再见,等. 多媒体通信业务流识别与分类方法综述 [J]. 南京邮电大学学报:自然科学版,2013, 33(3): 35-44.DONG Yu Ning, WANG Zai Jian, FANG Shu Guang, et al. Survey of methods for traffic identification and classification in multimedia communications [J]. Journal of Nanjing University of Posts and Telecommunications: Natural Sciences, 2013, 33(3): 35-44.[5] YANG Ning, TANG Chang Jie, WANG Yue, et al. Mining hotspots from multiple text streams based on stream information distance [J]. Journalof Software, 2011, 22(8): 1761-1770.[6] PARK B C, WON Y J, KIM M S. Towards automated application signature generation for traffic identification [C]//Proceedings of Network Operations and Management Symposium.2008:160-167.[7] RAAHEMI B,ZHONG W,LIU J. Peer-to-Peer traffic identification by mining IP layer data stream using concept-adapting very fast decision tree[C]∥Proceedings of 20th IEEE Computer Society Washington,2008.[8] LI W, MOORE A W. A machine learning approach for efficient traffic classification[C]∥Proceedings of 15th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems.IEEE Computer Society,Washington, 2008: 310-317.[9] NGUYEN T, ARMITAGE G. A survey of techniques for Internet traffic classification using machine learning [J]. IEEE Communication. Surveys Tuts. 2008, 4(10): 56-76.[10] JABER Mohanad, CASELLA Roberto G, BARAKAT Chadi. Can we trust the inter-packet time for traffic classification? [C]//Proceedings of Communications Society (ICC). IEEE, 2011: 1-5.[11] HAN Young Tae, SUN Wei Qiang, PARK Hong Shik. Service differentiation based on packet size and flow length in best-effort networks [C]//Information Networking, 2009: 1-3[12] MUJTABA G, PARISH D J. Detection of applications within encrypted tunnels using packet size distributions [C]//Internet Technology and Secured Transactions, 2009. ICITST 2009: 1-6.[13] BERNAILLE Laurent, TEIXEIRA Renata, AKODJENOU Ismael, SOULE Augustin, SALAMATIAN Kave. Traffic classification on the fly [C]//Proceedings of the ACM SIGCOMM Computer Communication Review, 2006: 23-26.[14] DIVAKARANL Dinil Mon, MURTHY Hema A, GONSALVES Timothy A. Traffic modeling and classification using packet train length and packet train size [J]. ACM SIGCOMM Computer Communication Review, 2007, 3065(1): 1-12.[15] DU Jiang, LONG Tao. P2P traffic identification research based on the SVM [C]//Wireless and Optical Communication Conference (WOCC), 2013 22nd: 683-686.[16] LI W, CANII M, MOORE A W, BOLLA R. Efficient application identification and the temporal and spatial stability of classification schema. Computer Networks, 2009, 53(6): 790-809.[17] JAISWAL R C, LOKHANDE S D. Machine learning based internet traffic recognition with statistical approach [C]//India Conference (INDICON), 2013 Annual IEEE: 1-6.[18] IBRAHIM H A H, MOHDNORS, AHMED A. Internet traffic classification algorithm based on hybrid classifiers to identify online games traffic [J]. Jurnal Teknologi, 2013, 64(3): 55-60.[19] JEFFREY E, MARTIN A, ANIRBAN M. Traffic classification using clustering algorithms [C]//Proceedings of SIGCOMM 2006, New York, USA: 281-286.[20] BERNAILLE L, TEIXEIRA R, AKODKENOU I, SOULE A, SALAMATIAN K. Traffic classification on the fly [J]. ACMSIGCOMM Computer Communication Review, 2006, 36(2): 23-26.[21] LIU Duo, LUNG Chung Hong. P2P traffic identification and optimization using fuzzy c-means clustering [C]// India Conference (INDICON), 2013 Annual IEEE Fuzzy Systems (FUZZ), 2011 IEEE International Conference on 27-30 June 2011: 2245 - 2252.[22] ZHIBIN Y, KIL G B, KIM S. Traffic classification based on visualization [C]//Networked Embedded Systems for Enterprise Applications (NESEA), 2011 IEEE 2nd International Conference on. IEEE, 2011: 1-6.[23] ZHANG J, CHEN C, XIANG Y, et al. Classification of correlated Internet traffic flows [C]//Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on. IEEE, 2012: 490-496. |