Bernaille L, Teixeira R, Salamatian K. Early application identification//Proceedings of the 2006 ACM CoNEXT Conference. New York: ACM, 2006: 6.
[2]
Crotti M, Dusi M, Gringoli F, et al. Traffic classification through simple statistical fingerprinting//ACM SIGCOMM Computer Communication Review. New York: ACM, 2007: 5-16.
[3]
马永立, 钱宗珏, 寿国础, 等. 机器学习用于网络流量识别[J]. 北京邮电大学学报, 2009, 32(1): 65-68. Ma Yongli, Qian Zongjue, Shou Guochu, et al. Network flow identification based on machine learning[J]. Journal of Beijing University of Posts and Telecommunication, 2009, 32(1): 65-68.
[4]
Fullmer M, Romig S. The OSU flow-tools package and CISCO NetFlow logs//Proceedings of the 14th USENIX Conference on System Administration. Berkeley: USENIX Association, 2000: 291-304.
[5]
Claffy K C. Internet traffic characterization. San Diego: University of California, 1994.
[6]
Sen S, Spatscheck O, Wang D. Accurate, scalable in-network identification of P2P traffic using application signatures//Proceedings of the 13th International Conference on World Wide Web. New York: ACM, 2004: 512-521.
[7]
Roughan M, Sen S, Spatscheck O, et al. Class-of-service mapping for QoS: a statistical signature-based approach to IP traffic classification//Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement. New York: ACM, 2004: 135-148.
[8]
Moore A, Papagiannaki K. Toward the accurate identification of network applications[M]. Berlin: Springer, 2005: 41-54.