References
- Myung-Sup Kim, Young J.Won, James Won-Ki Hong, "Application-Level Traffic Monitoring and an Analysis on IP Networks", ETRI Journal, Vol. 27, No.1, pp. 22-42, 2005. https://doi.org/10.4218/etrij.05.0104.0040
- S. Sen, J. Wang, "Analyzing peer-to-peer traffic across large networks", Internet Measurement Conference (IMC), Proc. Of the 2nd ACM SIGCOMM Workshop on Internet measurement, pp. 137-150, 2002.
- Internet Assigned Numbers Authority list, http://www.iana.org/assignments/port-numbers
- A. Moore, K. Papagiannaki, "Toward the Accurate Identification of Network Applications," Proc. PAM 2005, Boston, USA, 2005.
- F. Gringoli, L. Salgarelli, M. Dusi, N. Cascarano, F. Risso, K. Claffy, "GT: picking up the truth from the ground for Internet traffic," ACM SIGCOMM Computer Communication Review, 39(4), Oct. 2009.
- T. Karagiannis, A.Broido, M. Faloutsos, and kc claffy.Transport layer identification of P2P traffic. InACM/SIGCOMM IMC, 2004.
- M. Baldi, A. Baldini, N. Cascarano, and F. Risso, "Service-based traffic classification: Principles and validation", Proc. of the IEEE 2009 Sarnoff Symposium, Princeton, NJ, USA, Mar. 2009.
- Sung-Ho Yoon, Jin-Wan Park, Young-Seok Oh, Jun-Sang Park, and Myung-Sup Kim, "Internet Application Traffic Classification Using Fixed IP-port," Proc. of the Asia-Pacific Network Operations and Management Symposium(APNOMS) 2009, LNCS5787, Jeju, Korea, Sep. 23-25, pp. 21-30, 2009.
- V. Carela-Espanol, P. Barlet-Ros, M. Sole-Simo, A. Dainotti, W. de Donato, and A. Pescape, "K-Dimensional Trees for Continuous Traffic Classification," in Traffic Monitoring and Analysis: Second International Workshop, TMA 2010, Zurich, Switzerland, pp. 141, 2010.
- Byung-Chul Park, Young J. Won, Myung-Sup Kim, James W. Hong, "Towards Automated Application Signature Generation for Traffic Identification," Proc. of the IEEE/IFIP Network Operations and Management Symposium (NOMS) 2008, Salvador, Bahia, Brazil, Apri. 7-11, pp. 160-167, 2008.
- Cisco, NetFlow Services and Applications, White Paper, http://www.cisco.com/en/US/prod/collateral/iosswrel/ps6537/ps6555/ps6601/prod_white_paper0900aecd80406232.html.
- Chen, B.C., Yegneswaran, V., Barford, P., Ramakrishnan, R., "Toward a Query Language for Network Attack Data", 22nd International Conference on Data Engineering Workshops (ICDEW'06), pp. 28-36. IEEE Press, New York, 2006
- Bittorrent on http://www.bittorrent.com/
- Fileguri on http://www.fileguri.com/
- Internet Explorer on http://windows.microsoft.com/ko-KR/internet-explorer/downloads/ie
- Nateon on http://nateonweb.nate.com/
- K. Xu, Z. Zhang, and S. Bhattacharya, "Profiling Internet Backbone Traffic: Behavior Models and Applications", ACM SIGCOMM, pp. 169-180, 2005.
- Lan, K and Heidemann, J, "A measurement study of correlations of internet flow characteristics", Elsevier Computer Networks, 50(1), pp. 46-62, 2006. https://doi.org/10.1016/j.comnet.2005.02.008