-
1
-
-
62849120844
-
A survey of techniques for Internet traffic classification using machine learning
-
T.T. Nguyen, and G. Armitage A survey of techniques for Internet traffic classification using machine learning IEEE Commun. Surveys Tutor. 10 4 2008 56 76
-
(2008)
IEEE Commun. Surveys Tutor.
, vol.10
, Issue.4
, pp. 56-76
-
-
Nguyen, T.T.1
Armitage, G.2
-
2
-
-
33244467936
-
Internet traffic classification using Bayesian analysis techniques
-
A.W. Moore, and D. Zuev Internet traffic classification using Bayesian analysis techniques SIGMETRICS Perform. Eval. Rev. 33 2005 50 60
-
(2005)
SIGMETRICS Perform. Eval. Rev.
, vol.33
, pp. 50-60
-
-
Moore, A.W.1
Zuev, D.2
-
3
-
-
46149109490
-
Training on multiple sub-flows to optimise the use of machine learning classifiers in real-world ip networks
-
Los Alamitos, CA, USA
-
T. Nguyen, G. Armitage, Training on multiple sub-flows to optimise the use of machine learning classifiers in real-world ip networks, in: Annual IEEE Conference on Local Computer Networks, Los Alamitos, CA, USA, 2006, pp. 369-376.
-
(2006)
Annual IEEE Conference on Local Computer Networks
, pp. 369-376
-
-
Nguyen, T.1
Armitage, G.2
-
5
-
-
38049121051
-
Early recognition of encrypted applications
-
Berlin, Heidelberg
-
L. Bernaille, R. Teixeira, Early recognition of encrypted applications, in: Proceedings of the 8th International Conference on Passive and Active Network Measurement, Berlin, Heidelberg, 2007, pp. 165-175.
-
(2007)
Proceedings of the 8th International Conference on Passive and Active Network Measurement
, pp. 165-175
-
-
Bernaille, L.1
Teixeira, R.2
-
6
-
-
70350771144
-
Internet traffic classification demystified: Myths, caveats, and the best practices
-
New York, NY, USA
-
H. Kim, K. Claffy, M. Fomenkov, D. Barman, M. Faloutsos, K. Lee, Internet traffic classification demystified: myths, caveats, and the best practices, in: Proceedings of the ACM CoNEXT Conference, New York, NY, USA, 2008, pp. 1-12.
-
(2008)
Proceedings of the ACM CoNEXT Conference
, pp. 1-12
-
-
Kim, H.1
Claffy, K.2
Fomenkov, M.3
Barman, D.4
Faloutsos, M.5
Lee, K.6
-
7
-
-
67650713589
-
Support vector machines for tcp traffic classification
-
A. Este, F. Gringoli, and L. Salgarelli Support vector machines for tcp traffic classification Computer Networks 53 14 2009 2476 2490
-
(2009)
Computer Networks
, vol.53
, Issue.14
, pp. 2476-2490
-
-
Este, A.1
Gringoli, F.2
Salgarelli, L.3
-
8
-
-
84870950267
-
Network traffic classification using correlation information
-
10.1109/TPDS.2012.98
-
J. Zhang, Y. Xiang, Y. Wang, W. Zhou, Y. Xiang, and Y. Guan Network traffic classification using correlation information IEEE Trans. Parallel Distrib. Syst. 2012 1 15 10.1109/TPDS.2012.98
-
(2012)
IEEE Trans. Parallel Distrib. Syst.
, pp. 1-15
-
-
Zhang, J.1
Xiang, Y.2
Wang, Y.3
Zhou, W.4
Xiang, Y.5
Guan, Y.6
-
9
-
-
35048887481
-
Flow clustering using machine learning techniques
-
Antibes Juan-les-Pins, France, April
-
A. McGregor, M. Hall, P. Lorier, J. Brunskill, Flow clustering using machine learning techniques, in: Proceedings of Passive and Active Measurement Workshop, Antibes Juan-les-Pins, France, April 2004, pp. 205-214.
-
(2004)
Proceedings of Passive and Active Measurement Workshop
, pp. 205-214
-
-
McGregor, A.1
Hall, M.2
Lorier, P.3
Brunskill, J.4
-
10
-
-
33751393658
-
Automated traffic classification and application identification using machine learning
-
Los Alamitos, CA, USA
-
S. Zander, T. Nguyen, G. Armitage, Automated traffic classification and application identification using machine learning, in: Annual IEEE Conference on Local Computer Networks, Los Alamitos, CA, USA, 2005, pp. 250-257.
-
(2005)
Annual IEEE Conference on Local Computer Networks
, pp. 250-257
-
-
Zander, S.1
Nguyen, T.2
Armitage, G.3
-
11
-
-
33646890686
-
Traffic classification on the fly
-
L. Bernaille, R. Teixeira, I. Akodkenou, A. Soule, and K. Salamatian Traffic classification on the fly SIGCOMM Comput. Commun. Rev. 36 2006 23 26
-
(2006)
SIGCOMM Comput. Commun. Rev.
, vol.36
, pp. 23-26
-
-
Bernaille, L.1
Teixeira, R.2
Akodkenou, I.3
Soule, A.4
Salamatian, K.5
-
12
-
-
34248358287
-
Traffic classification using clustering algorithms
-
New York, NY, USA
-
J. Erman, M. Arlitt, A. Mahanti, Traffic classification using clustering algorithms, in: Proceedings of the SIGCOMM Workshop on Mining Network Data, New York, NY, USA, 2006, pp. 281-286.
-
(2006)
Proceedings of the SIGCOMM Workshop on Mining Network Data
, pp. 281-286
-
-
Erman, J.1
Arlitt, M.2
Mahanti, A.3
-
13
-
-
35348815604
-
Identifying and discriminating between web and peer-to-peer traffic in the network core
-
New York, NY, USA
-
J. Erman, A. Mahanti, M. Arlitt, C. Williamson, Identifying and discriminating between web and peer-to-peer traffic in the network core, in: Proceedings of the 16th International Conference on World Wide Web, New York, NY, USA, 2007, pp. 883-892.
-
(2007)
Proceedings of the 16th International Conference on World Wide Web
, pp. 883-892
-
-
Erman, J.1
Mahanti, A.2
Arlitt, M.3
Williamson, C.4
-
14
-
-
34249790654
-
Unexpected means of protocol inference
-
New York, NY, USA
-
J. Ma, K. Levchenko, C. Kreibich, S. Savage, G.M. Voelker, Unexpected means of protocol inference, in: Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement, New York, NY, USA, 2006, pp. 313-326.
-
(2006)
Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement
, pp. 313-326
-
-
Ma, J.1
Levchenko, K.2
Kreibich, C.3
Savage, S.4
Voelker, G.M.5
-
15
-
-
79955122296
-
Mining unclassified traffic using automatic clustering techniques
-
Vienna, AU, April
-
A. Finamore, M. Mellia, M. Meo, Mining unclassified traffic using automatic clustering techniques, in: TMA International Workshop on Traffic Monitoring and Analysis, Vienna, AU, April 2011, pp. 150-163.
-
(2011)
TMA International Workshop on Traffic Monitoring and Analysis
, pp. 150-163
-
-
Finamore, A.1
Mellia, M.2
Meo, M.3
-
16
-
-
77956489422
-
An automatic application signature construction system for unknown traffic
-
Y. Wang, Y. Xiang, and S.-Z. Yu An automatic application signature construction system for unknown traffic Concurrency Computat. Pract. Exper. 22 2010 1927 1944
-
(2010)
Concurrency Computat. Pract. Exper.
, vol.22
, pp. 1927-1944
-
-
Wang, Y.1
Xiang, Y.2
Yu, S.-Z.3
-
17
-
-
29244451861
-
ACAS: Automated construction of application signatures
-
ACM New York, NY, USA
-
P. Haffner, S. Sen, O. Spatscheck, and D. Wang ACAS: automated construction of application signatures Proceedings of the ACM SIGCOMM Workshop on Mining Network Data 2005 ACM New York, NY, USA 197 202
-
(2005)
Proceedings of the ACM SIGCOMM Workshop on Mining Network Data
, pp. 197-202
-
-
Haffner, P.1
Sen, S.2
Spatscheck, O.3
Wang, D.4
-
18
-
-
77958152377
-
KISS: Stochastic packet inspection classifier for UDP traffic
-
A. Finamore, M. Mellia, M. Meo, and D. Rossi KISS: Stochastic packet inspection classifier for UDP traffic IEEE/ACM Trans. Netw. 18 5 2010 1505 1515
-
(2010)
IEEE/ACM Trans. Netw.
, vol.18
, Issue.5
, pp. 1505-1515
-
-
Finamore, A.1
Mellia, M.2
Meo, M.3
Rossi, D.4
-
21
-
-
81155123377
-
A novel semi-supervised approach for network traffic clustering
-
Milan, Italy, September
-
Y. Wang, Y. Xiang, J. Zhang, S.-Z. Yu, A novel semi-supervised approach for network traffic clustering, in: International Conference on Network and System Security, Milan, Italy, September 2011.
-
(2011)
International Conference on Network and System Security
-
-
Wang, Y.1
Xiang, Y.2
Zhang, J.3
Yu, S.-Z.4
-
23
-
-
33745155436
-
A Bayesian hierarchical model for learning natural scene categories
-
San Diego, CA, USA, June
-
L. Fei-Fei, P. Perona, A Bayesian hierarchical model for learning natural scene categories, in: IEEE Computer Society Conference on Computer Vision and Pattern Recognition, vol. 2, San Diego, CA, USA, June 2005, pp. 524-531.
-
(2005)
IEEE Computer Society Conference on Computer Vision and Pattern Recognition
, vol.2
, pp. 524-531
-
-
Fei-Fei, L.1
Perona, P.2
-
24
-
-
27544498978
-
Polygraph: Automatically generating signatures for polymorphic worms
-
J. Newsome, B. Karp, D. Song, Polygraph: Automatically generating signatures for polymorphic worms, in: IEEE Symposium on Security and Privacy, 2005, pp. 226-241.
-
(2005)
IEEE Symposium on Security and Privacy
, pp. 226-241
-
-
Newsome, J.1
Karp, B.2
Song, D.3
-
25
-
-
84989525001
-
Indexing by latent semantic analysis
-
S. Deerwester, S.T. Dumais, G.W. Furnas, T.K. Landauer, and R. Harshman Indexing by latent semantic analysis J. Amer. Soc. Inform. Sci. 41 6 1990 391 407
-
(1990)
J. Amer. Soc. Inform. Sci.
, vol.41
, Issue.6
, pp. 391-407
-
-
Deerwester, S.1
Dumais, S.T.2
Furnas, G.W.3
Landauer, T.K.4
Harshman, R.5
-
26
-
-
34548118248
-
Offline/realtime traffic classification using semi-supervised learning
-
J. Erman, A. Mahanti, M. Arlitt, I. Cohen, and C. Williamson Offline/realtime traffic classification using semi-supervised learning Performance Evaluation 64 9-12 2007 1194 1213
-
(2007)
Performance Evaluation
, vol.64
, Issue.912
, pp. 1194-1213
-
-
Erman, J.1
Mahanti, A.2
Arlitt, M.3
Cohen, I.4
Williamson, C.5
-
27
-
-
84875224817
-
-
Weka 3: Data Mining Software in Java, [online], available
-
Weka 3: Data Mining Software in Java, [online], available: http://www.cs.waikato.ac.nz/ml/weka/
-
-
-
|