参考文献
[1]李尧,郝文.加密网络流量类型识别研究[J].计算机应用,2009,29(6):1662-1664.
[2]万月亮,朱贺军,刘宏志.流特征的Skype流量识别[J].智能系统学报,2010,5(2):139-143.
[3]于强,霍红卫.一组提高存储效率的深度包检测算法[J].软件学报,2011,22(1):149-163.
[4]徐鹏,林森.基于C4.5 决策树的流量分类方法[J].软件学报,2009,20(10):2692-2704.
[5]Calladoa A,Kelnerb J,Sadokb D,et al.Better Network Traffic Identification Through the Independent Combina-tion of Techniques[J].Journal of Network and Com-puter Applications,2010,33(4):433-446.
[6]陈伟,胡磊,杨龙.基于载荷特征的加密流量快速识别方法[J].计算机工程,2012,38(12):22-25.
[7]张波.基于流特征的加密流量识别技术研究[D].哈尔滨:哈尔滨工业大学,2012.
[8]叶春明,李志,郑科栋,等.一种基于用户行为状态特征的流量识别方法[J].计算机应用研究,2015,32(2):560-564.
[9]Alshammari R,Zincir-Heywood A N.Can Encrypted Traffic Be Identified Without Port Numbers,IP Address-es and Payload Inspection?[J].Computer Networks,2011,55(6):1326-1350.
[10]Dainotti A,Gargiulo F,Kuncheva L,et al.Identification of Traffic Flows Hiding Behind TCP Port 80[C]//Proceedings of ICC’10.Washington D.C.,USA:IEEE Press,2010:1-6.
[11]Li Bing,Jin Zhigang,Ma Maode.VoIP Traffic Identification Based on Host and Flow Behavior Anal-ysis[C]//Proceedings of WiCOM’10.Washington D.C.,USA:IEEE Press,2010:1-4.
[12]谢希仁.计算机网络[M].6版.北京:电子工业出版社,2013.
[13]王玉孝,柳金,姜炳麟,等.概率论、随机过程与数理统计[M].北京:北京邮电大学出版社,2010.
[14]李寅,周井泉.一种基于平均数据包长度的可变权值调度算法[J].计算机技术与发展,2012,22(9):116-118.
编辑陆燕菲 |