A Semi-Supervised Clustering Method For P2P Traffic Classification
Abstract
Keywords
References
[1] S. Sen and J. Wang, “Analyzing peer-to-peer traffic across large networks,” IEEE/ACM Transactions on Networking (TON), vol. 12, issue 2,pp. 219-232, April 2004.
[2] S. Saroiu, K. P. Gummadi, R. J. Dunn, S. D. Gribble, and H. M. Levy,An analysis of Internet content delivery systems,” in Proceedings of the 5th symposium on Operating systems design and implementation, 2002,pp. 315-327.
[3] S. Sen, O. Spatscheck, and D. Wang, “Accurate, scalable in-network identification of P2P traffic using application signatures,” in Proceedings of the 13th international conference on World Wide Web, New York, USA, 2004, pp. 512-521.
[4] T. Karagiannis, A. Broido, N. Brownlee, kc claffy, and M. Faloutsos,“Is P2P dying or just hiding?” in IEEE Globecom 2004 - Global Internet and Next Generation Networks, Dallas, TX, USA, 2004
[5] H. Bleul, E. P. Rathgeb, and S. Zilling, “Evaluation of an efficient measurement concept for P2P multiprotocol traffic analysis,” in Proceed-ings of the 32nd EUROMICRO Conference on Software Engineering and Advanced Applications, 2006, pp. 414-423.
[6] A. Spognardi, A. Lucarelli, and R. D. Pietro, “A methodology for P2P file-sharing traffic detection,” in Proceedings of the Second International Workshop on Hot Topics in Peer-to-Peer Systems - Volume 00 HOT-P2P’05, 2005, pp. 52-61.
[7] T. Karagiannis, A. Broido, M. Faloutsos, and kc claffy, “Transport layer identification of P2P traffic,” in Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, Taormina, Sicily, Italy, 2004, pp.121-134
[8] F. Constantinou and P. Mavrommatis, “Identifying known and unknown peer-to-peer traffic,” in Proceedings of the Fifth IEEE International Symposium on Network Computing and Applications, 2006, pp. 93-102.
doi:10.1109/NCA.2006.34
[9] Thomas Karagiannis, Konstantina Papagiannaki, Michalis Faloutsos, BLINC: Multilevel Traffic Classification in the Dark, ACM SIGCOMM. 35 (4), pp. 229-240, 2005
[10] A. W. Moore J.Hall, C.Kreibich, E. Harris, and I. Pratt. ̌Architecture of a Network Monitor.̍ In Passive & Active Measurement Workshop 2003 (PAM2003), La Jolla, CA, April 2003.
[11] A. W. Moore and D. Papagiannaki. “Toward the Accurate Identification of Network Applications.” In Proceedings of the Sixth Passive and Active Measurement Workshop (PAM 2005), March 2005.
[12] A. W. Moore and D. Zuev. “Internet Traffic Classification Using Bayesian Analysis Techniques.” SIGMETRICS Perform. Eval. Rev., vol. 33, pp. 50-60, 2005.
doi:10.1145/1071690.1064220
[13] A. W. Moore and D. Zuev. “Discriminators for use in flow-based classification”. Technical report, Intel Research, Cambridge, 2005
[14] L. Zhu, R. Yuan, and X. Guan, “Accurate Classification of the Internet Traffic Based on the SVM Method.” ICC 2007, June 24-28, Glasgow, 2007.
[15] F Hernandez, A B Nobel, F D Smith, and K Jeffay. “Statistical Clustering of Internet Communication Patterns.” In Proceedings of Symposium on the Interface of Computing Science and Statistics, 2003.
[16] A. McGregor, M. Hall, P. Lorier, and J. Brunskill. “Flow Clustering Using Machine Learning Techniques.” In PAM, 2004.
[17] S. Zander, T. Nguyen, and G. Armitage. “Automated traffic classification and application identification using machine learning.” In Passive & Active Meas
Full Text: PDF