[1] CALLADO A, KAMIENSKI C, SZABO G. A survey on Internet traffic identification [J]. IEEE Communications Surveys and Tutorials, 2009, 11(3): 37-52.[2] SEN S, SPATSCHECK O, WANG D. Accurate scalable in network identification of P2P traffic using application signatures [C]// Proceedings of the 13th International Conference on World Wide Web. New York: ACM, 2004: 512-521.[3] ZANDER S, NGUYEN T, ARMITAGE G. Automated traffic classification and application identification using machine learning [C]// Proceedings of the 30th Conference on Local Computer Networks. Piscataway: IEEE, 2005: 1-8.[4] ERMAN J, ARLITT M, MAHANTI A. Traffic classification using clustering algorithms [C]// Proceedings of the 2006 SIGCOMM Workshop on Mining Network Data. New York: ACM, 2006: 11-15.[5] 蔡君,余顺争.基于复杂网络社团划分的网络流量分类[J].计算机科学,2011,38(3):80-82[6] KARAGIANNIS T, PAPAGIANNAKI D, FALOUTSOS M. BLINC: Multilevel traffic classification in the dark [J]. Computer Communication Review, 2005, 35(4): 229-240.[7] DEWAELE G, HIMURA Y, BORGNAT P. Unsupervised host behavior classification from connection patterns [J]. International Journal of Network Management, 2010, 20(5): 317-337.[8] WEI L, MOORE W, CANINI M. Classifying HTTP traffic in the new age [C]// Conference of the Special Interest Group on Data Communication 2008. New York: ACM, 2008: 479-480.[9] FLOYD S, PAXSON V. Difficulties in simulating the Internet [J]. IEEE/ACM Transactions on Networking, 2001, 9(4): 392-403.[10] SOULE A, LAKHINA A, TAFT N, et al. Traffic matrices: balancing measurements, inference and modeling [J]. ACM SIGMETRICS Performance Evaluation Review, 2005: 33(1): 362-373.[11] 张文铸,刘佳,袁坚,等.基于PCA的对等网络流量时空特性监测[J].清华大学学报,2010,50(4):561-564. |