Network Application Identification Based on Communication Characteristics of Application Messages
Network Application Identification Based on Communication Characteristics of Application Messages
出处
《通讯和计算机(中英文版)》
2011年第2期111-119,共9页
Journal of Communication and Computer
参考文献20
-
1T. Masak. A. Shingoand. O. Ikuo. A classification method for bulk/real-time traffic based on flow statistics, IE[CE Technical Report, NS2006-28: 29-32, May, 2006.
-
2T. Kitamura, T. Shizuno, T. Okabe, Traffic Identification Method with Packet-Type Transition Pattern Analysis, IEICE Technical Report, NS2006-27: 25-28, May, 2006.
-
3N. Fumitaka, M. Takashi, W. Yasushi, T. Yoshiaki, Traffic feature analysis and application discrimination, IE1CE Technical Report, NS2007- 80: 57-62, Sep., 2006.
-
4T. Matsuda. F. Nakamura, Y. Wakahara, Y. Tanaka, P2P traffic discrimination technique based on TCP session statistics, in: 2005 IEICE General Conference, 2005.
-
5S. Sen, O. Spatscheck, D. Wang Accurate, scalable in-network identification of p2p traffic using application signatures, in WWW '04: Proceedings of the 13tb International Conference on World Wide Web, 2004, pp 512-521.
-
6P. Haffner, S. Sen, O. Spatscheck, D. Wang Acas: Automated construction of application signatures, in: SIGCOMM '05 Workshops, 2005.
-
7M. Roughan, S. Sen, O. Spatscheck, N. Duffield. Class-of-service mapping for QOS: A statistical signature-based approach to IP traftic classification, in: IMC '04: Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement, ACM Press, 2004, pp. 135-148.
-
8T. Karagiannis. K, Papagiannaki. M Faloutsos. Blinc: Multilevel traffic classification in lhe dark. ACM SIGCOMM. 2005, pp. 229-240.
-
9T. Karagiannis. A. Broido. M Faloutos. K.C. Claffy, Transport layer identification of p2p traffic, in IMC'04. Oct., 2004.
-
10F. Nakamura. Y. Matuda, Y. Wakahara, Y. Tanaka, Traffic feature analysis and application discrimination, in: 1E1CE Technical Report, 2006, pp. 57-62.
-
1霍文捷 Liu Zhenglin Zou Xuecheng.Secure encryption embedded processor design for wireless sensor network application[J].High Technology Letters,2011,17(1):75-79.
-
2其它计算机理论与技术[J].电子科技文摘,2002,0(5):109-110.
-
3XU Xinhai,LIN Yufei,YANG Xuejun.Protocol-Aware Process Placement for MPI Programs[J].Chinese Journal of Electronics,2014,23(4):701-705.
-
4WEN Wei-ping 1,2,3, QING Si-han 1,2,31. Institute of Software, the Chinese Academy of Sciences, Beijing 100080, China,2.Engineering Research Center for Information Security Technology, the Chinese Academy of Sciences, Beijing 100080, China,3.Graduate School of the Chinese Academy of Sciences, Beijing 100080, China.Mechanism and Defense on Malicious Code[J].Wuhan University Journal of Natural Sciences,2005,10(1):83-88.
-
5舒远仲,王亚钢.Optimal Packet Size of Underwater Sensor Networks[J].Journal of Donghua University(English Edition),2015,32(2):310-313. 被引量:1
-
6Ming-fang Wang Department of Computer Science, University of Central ArkansasConway, Arkansas 72035 wangm @ panda.cs.uca.eduWu JieShanghai Institute of Computing Tech. Shanghai, China 200040 Telephone: 62520070.Some Practical Issues Regarding Java Programming[J].计算机工程,1996,22(S1):106-121.
-
7谭骏,陈兴蜀,杜敏,朱锴.A novel internet traffic identification approach using wavelet packet decomposition and neural network[J].Journal of Central South University,2012,19(8):2218-2230. 被引量:6
-
8杜敏,陈兴蜀,谭骏.Accurate P2P traffic identification based on data transfer behavior[J].Journal of Harbin Institute of Technology(New Series),2012,19(4):43-48. 被引量:1
-
9刘兵,张大方,宣恒农.基于布尔方程的系统级故障诊断表示及应用[J].计算机科学,2003,30(6):165-167. 被引量:2
-
10赵学健,庄毅,王进.Local adaptive transmit power assignment strategy for wireless sensor networks[J].Journal of Central South University,2012,19(7):1909-1920. 被引量:1