[1] Moore A W, Zuev D. Internet Traffic Classification Using Baye- sian Analysis Techniques[C]//Proc. of SIGMETRIC’05. Banff, Canada: [s. n.], 2005: 50-60.
[2] Liu Feng, Li Zhitang, Nie Qingbin. A New Method of P2P Traffic Identification Based on Support Vector Machine at the Host Level[C]//Proc. of ITCS’09. Washington D. C., USA: [s. n.], 2009: 579-582.
[3] 李 鑫, 刘东林. 基于统计特征的P2P流量检测方法[J]. 计算机工程, 2010, 36(5): 114-115.
[4] Alshammari R, Zincir-Heywood A N. Can Encrypted Traffic be Identified Without Port Numbers, IP Addresses and Payload Inspection?[J]. Computer Networks, 2011, 55(6): 1326-1350.
[5] Dainotti A, Gargiulo F, Kuncheva L, et al. Identification of Traffic Flows Hiding Behind TCP Port 80[C]//Proc. of IEEE ICC’10. Capetown, South Africa: [s. n.], 2010: 1-6.
[6] Li Bing, Jin Zhigang, Ma Maode. VoIP Traffic Identification Based on Host and Flow Behavior Analysis[C]//Proc. of WiCOM’10.
Chengdu, China: [s. n.], 2010: 1-4.
[7] Calladoa A, Kelnerb J, Sadokb D, et al. Better Network Traffic Identification Through the Independent Combination of Techniques[J]. Journal of Network and Computer Applications, 2010, 33(4): 433-446.
[8] 胡 婷, 王 勇, 陶晓玲. 混合模式的网络流量分类方法[J]. 计算机应用, 2010, 30(10): 2653-2655.
[9] 许孟晋, 张博锋. 基于机器学习的Internet流量分类[J]. 计算机应用, 2010, 30(1): 80-82.
[10] 陈 亮, 龚 俭. 基于卡方统计的应用协议流量行为特征分析方法[J]. 软件学报, 2010, 21(11): 2852-2865.
[11] 钱叶魁, 陈 鸣, 郝 强, 等. ODC在线检测和分类全网络流量异常的方法[J]. 通信学报, 2011, 32(1): 111-120.
[12] Lin Ping, Lei Zhenming, Chen Luying, et al. Decision Tree Network Traffic Classifier via Adaptive Hierarchical Clustering for Imperfect Training Dataset[C]//Proc. of WiCom’09. Beijing, China: [s. n.], 2009: 1-6.
[13] 徐 鹏, 林 森. 基于C4.5决策树的流量分类方法[J]. 软件学报, 2009, 20(10): 2692-2704.
[14] Alshammari R, Zincir-Heywood A. N. Machine Learning Based Encrypted Traffic Classification: Identifying SSH and Skype[C]// Proc. of IEEE CISDA’09. Ottawa, Canada: [s. n.], 2009: 1-8.
[15] Liberatore M, Levine P N. Inferring the Source of Encrypted HTTP Connections[C]//Proc. of the 13th ACM Conference on Computer and Communications Security. New York, USA: ACM Press, 2006: 255-263. |