[1] VOLZ B, CAIN E, KOHLER E, et al. Service name and transport protocol port number registry[EB/OL].[2012-06-06]. http://www.iana.org/assignments/port-numbers. [2] HUANG S, CHEN K, LIU C. A statistical-feature-based approach to Internet traffic classification using machine learning[C]//ICUMT 2009: Proceedings of the 2009 International Conference on Ultra Modern Telecommunications & Workshops. Piscataway, NJ: IEEE, 2009: 1-6. [3] KARAGIANNIS T, PAPAGIANNAKI K, FALOUTSOS M. BLINC: multilevel traffic classification in the dark[C]//SIGCOMM 2005: Proceedings of the 2005 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications. New York: ACM, 2005: 229-240. [4] MOORE A W, PAPAGIANNAKI K. Toward the accurate identification of network applications[C]//PAM 2005: Proceedings of the 6th International Conference on Passive and Active Network Measurement. Berlin: Springer, 2005: 41-54. [5] WANG Y, XIANG Y, YU S-Z. Automatic application signature construction from unknown traffic[C]//Proceedings of the 201024th IEEE International Conference on Advanced Information Networking and Applications. Piscataway, NJ: IEEE, 2010: 1115-1120. [6] LUO J Z, YU S Z, CAI J. Capturing uncertainty information and categorical characteristics for network payload grouping in protocol reverse engineering[J]. Mathematical Problems in Engineering, 2015, 2015(6): 1-9. [7] 刘兴彬, 杨建华, 谢高岗, 等. 基于Apriori算法的流量识别特征自动提取方法[J]. 通信学报, 2008, 29(12): 51-59.(LIU X B, YANG J H, XIE G G, et al. Automated mining of packet signatures for traffic identification at application layer with Apriori algorithm[J]. Journal on Communications, 2008, 29(12): 51-59.) [8] AGRAWAL R, SRIKANT R. Fast algorithms for mining association rules in large databases[C]//VLDB 1994: Proceedings of the 20th International Conference on Very Large Data Bases. San Francisco: Morgan Kaufmann Publishers, 1994: 487-499. [9] 王变琴, 余顺争. 自适应网络应用特征发现方法[J]. 通信学报, 2013, 34(4): 127-137.(WANG B Q, YU S Z. Adaptive extraction method of network application signatures[J]. Journal on Communications, 2013, 34(4): 127-137.) [10] 朱玉娜, 韩继红, 袁霖, 等. SPFPA: 一种面向未知安全协议的格式解析方法[J]. 计算机研究与发展, 2015, 52(10): 2200-2211.(ZHU Y N, HAN J H, YUAN L, et al. SPFPA: a format parsing approach for unknown security protocols[J]. Journal of Computer Research and Development, 2015, 52(10): 2200-2211.) [11] HAN J, PEI J, YIN Y, et al. Mining frequent patterns without candidate generation: a frequent-pattern tree approach[J]. Data Mining & Knowledge Discovery, 2004, 8(1): 53-87. [12] ESTER M, KRIEGEL H P, SANDER J, et al. A density-based algorithm for discovering clusters in large spatial databases with noise[C]//Proceedings of the Second International Conference on Knowledge Discovery and Data Mining. Menlo Park, CA: AAAI Press, 1996: 226-231. [13] PEI J, HAN J, MORTAZAVI-ASL B, et al. Mining sequential patterns by pattern-growth: the PrefixSpan approach[J]. IEEE Transactions on Knowledge and Data Engineering, 2004, 16(11): 1424-1440. [14] HAFFNER P, SEN S, SPATSCHECK O, et al. ACAS: automated construction of application signatures[C]//MineNet 2005: Proceedings of the 2005 ACM SIGCOMM Workshop on Mining Network Data. New York: ACM, 2005: 197-202. [15] ERMAN J, ARLITT M, MAHANTI A. Traffic classification using clustering algorithms[C]//MineNet 2006: Proceedings of the 2006 SIGCOMM Workshop on Mining Network Data. New York: ACM, 2006: 281-286. [16] Application layer packet classifier for Linux[EB/OL].[2012-06-02]. http://l7-filter.sourceforge.net/. [17] Application layer packet classifier for Linux-HOWTO[EB/OL].[2012-06-03]. http://17-filter.sourceforge.net/documents. |