References
- H. Schulze and K. Mochalski, Ipoque Internet Study 2008/2009, http://www.ipoque.com/.
- G. Szabo, I. Szabo, and D. Orincsay, "Accurate Traffic Classification," IEEE Int. Symposium on World of Wireless Mobile and Multimedia Networks, pp. 1-8, 2007. https://doi.org/10.1109/WOWMOM.2007.4351725
- J. Erman, A. Mahanti, and M. Arlitt, "Internet Traffic Identification using Machine Learning," IEEE Conf. on Global Telecommunications, pp. 1-6, 2006.
- T. Auld, A. Moore, and S. Gull, "Bayesian Neural Networks for Internet Traffic Classifications," IEEE Trans. on Neural Networks, Vol. 18, No. 1. pp. 223-239, 2007. https://doi.org/10.1109/TNN.2006.883010
- Y. Liu, R. Wang, H. Huang, Y. Zeng, and H. He, "Applying Support Vector Machine to P2P Traffic Identification with Smooth Processing," IEEE Int. Conf. on Signal Processing, Vol. 3, pp.16-20, 2006.
- F. J. Gonzalez-Castano, P. S.Rodriguez-Hernandez R. P. Martinez-Alvarez, A. Gomez, I. Lopez- Cabido, and J. Villasuso-Barreiro, "Support Vector Machine Detection of Peer-to-Peer Traffic," IEEE Int. Conf. on Computational Intelligence for Measurement Systems and Applications, pp. 103-108, 2006.
- A. Yang, S. Jiang, and H. Deng, "A P2P Network Traffic Classification Method using SVM," The 9th Int. Conf. for Young Computer Scientists, pp. 398-403, 2008.
- X. Zhou, "A P2P Traffic Classification Method Based on SVM," Int. Symposium Computer Science and Computational Technology, pp. 53-57, 2008.
- H. Lee, J. Song, and D. Park, "Intrusion Detection System Based on Multi-class SVM," LNAI, 3642, pp. 511-519, 2005.
- M. Tai, S. Ata, and I. Oka, "Fast, Accurate, and Lightweight Real-Time Traffic Identification Method Based on Flow Statistics," LNCS, 4427, pp. 255-259, 2007.
- T. Karagiannis, K. Papagiannaki, and M. Faloutsos, "BLINC: Multilevel Traffic Classification in the Dark," In Proc. of ACM SIGCOMM, Vol. 35, No.4, pp. 229-240, 2005. https://doi.org/10.1145/1090191.1080119
- J. Li, S. Zhang, S. Liu, and Y. Xuan, "Active P2P Traffic Identification Technique," IEEE Int. Conf. on Computational Intelligence and .Security, pp. 37-41, 2007.
- G. Zhang, G. Xie, J. Yang, Y. Min, Z. Zhou, and X. Duan, "Accurate Online Traffic Classification with Multi-phases Identification Methodology," IEEE Int. Conf. on Consumer Communications and Networking, pp. 141-146, 2008.
- P. Phaal, S. Panchen, and N. McKee, InMon Corporation's sFlow: A Method for Monitoring Traffic in Switched and Routed Networks, IETF RFC 3176, 2001.
- Cisco Systems, White Papers, NetFlow Services and Applications, http://www.cisco.com/warp/public/cc/pd/iosw/ioft/neflct/tech/napps_wp.htm.
- S. Han, M, Kim, H, Ju, and J. W. Hong, "The Architecture of NG-MON: A Passive Network Monitoring System," LNCS, 2506, pp. 16-27, 2002.
- M. Hall, Correlation-based Feature Selection for Machine Learning, PhD Diss. Department of Computer Science, Waikato University, Hamilton, NZ, 1998.
- I. Seok, J. Lee, and B. Moon, "Hybrid Genetic Algorithms for Feature Selection," IEEE Trans. on Pattern Analysis and Machine Intelligence, Vol. 26, No. 11, pp. 1424-1437, 2006. https://doi.org/10.1109/TPAMI.2004.105
- F. Fleuret, "Fast Binary Feature Selection with Conditional Mutual Information," Journal of Machine Learning Research, Vol. 5, pp. 1531-1555, 2004.
- Y. Sun and J. Li, "Iterative RELIEF for Feature Weighting," In Proc. of the 23rd Int. Conf. on Machine Learning, pp. 913-920, 2006.
- T. Ambwani, "Multi Class Support Vector Machine Implementation to Intrusion Detection," In Proc. of the Int. Conf. on Neural Networks, Vol. 3, pp.2300-2305, 2003. https://doi.org/10.1109/IJCNN.2003.1223770
- B. Park, Y. Won, M. Kim, and Hong, J. W. Hong, "Towards Automated Application Signature Generation for Traffic Identification," Network Operations and Management Symposium, pp. 160-167, 2008.
- Machine Learning Lab in The University of Waikato, http://www.cs.waikato.ac.nz/ml..
Cited by
- An analysis of satisfaction index on computer education of university based on Fuzzy Decision Making Method vol.16, pp.4, 2013, https://doi.org/10.9717/kmms.2013.16.4.502