References
- W. Li, A. W. Moore, and M. Canini, "Classifying HTTP traffic in the new age," in Proc. ACM SIGCOMM, pp. 479-489, Washington, USA, Aug. 2008.
- Y. Bhole and A. Popescu, "Measurement and analysis of HTTP traffic," J. Network and Systems Management, vol. 13, no. 6, pp. 357-371, Dec. 2005. https://doi.org/10.1007/s10922-005-9000-y
- J. S. Park, S. H. Yoon, and M. S. Kim, "Performance improvement of the payload signature based traffic classification system using application traffic locality," J. KICS, vol. 38B, no. 7, pp. 519-525, Jul. 2013. https://doi.org/10.7840/kics.2013.38B.7.519
- S. H. Yoon, H. G. Roh, and M. S. Kim, "Internet application traffic classification using traffic measurement agent," in Proc. KICS, pp. 1747-1750, Jeju Island, Korea, Jul. 2008.
- C. S. Park, J. S. Park, and M. S. Kim, "Study on automatic payload signature generation system using protocol filter," in Proc. KICS, pp. 655-656, Jeju Island, Korea, Jun. 2013.
- F. Risso, M. Baldi, O. Morandi, A. Baldini, and P. Monclus, "Lightweight, payload-based traffic classification an experimental evaluation," in Proc. IEEE Commun., pp. 5869-5875, Beijing, China, May 2008.
- J. H. Kim, S. H. Yoon, and M. S. Kim, "Study on traffic classification taxonomy for multiliteral and hierarchical traffic classification," in Proc. APNOMS, pp. 1-4, Seoul, Korea, Sept. 2012.
- J. H. Kim, S. H. Yoon, and M. S. Kim, "Research on traffic taxonomy for internet traffic classification," in Proc. APNOMS, Taipei, Taiwan, Sept. 2011.
- J.L. Garcia-Dorado, J.A. Hernandez, J. Aracil, J.E.L. Vergara, F.J. Montserrat, E. Robles, and T.P. Miguel, "On the duration and spatial characteristics of Internet traffic measurement experiments," IEEE Commun. Mag., vol. 46, no. 11, pp. 148-155, Nov. 2008.
- T. Bujlow, T. Riaz, and J. M. Pedersen, "A method for classification of network traffic based on C5.0 Machine Learning Algorithm," in Proc. ICNC, pp. 244-248, Maui, HI, USA, Feb. 2012.
- G. Vasiliadis, M. Polychronakis, S. Antonatos, E. P. Markatos, and S. Ioannidis, "Regular expression matching on graphics hardware for intrusion detection," in Proc. RAID, pp. 265-283, Saint-Malo, France, Sept. 2009.
- M. Roesch. "Snort - lightweight intrusion detection for networks," in Proc. USENIX LISA, pp. 229-238, Washington, USA, Nov. 1999.
- A. V. Aho and M. J. Corasick, "Efficient string matching: An aid to bibliographic search," Commun. ACM, vol. 18, no. 6, pp. 333-340, Jun. 1975. https://doi.org/10.1145/360825.360855
- T. H. Cormen, C. E. Leiserson, and R. L. Rivest, and C. Stein, Introduction to Algorithms 3rd Ed., The MIT press, 2009.
- ITS Committee, Tool Interface Standard (TIS) Executable and Linking Format (ELF) Specification Version 1.2, May 1995.
- B. Jenkins, "A new hash functions for hash table lookup," J. Dr. Dobb's, Sept. 1997.