3EARLY J, I3RODLEY C, ROSENBERG C. Rosenberg Behavioral authentication of server flows[C]// In Proceedings of the 19th Annual Computer Security Application Conference.IEEE, December 2003,46-55.
4SubhabrataSen,Jia Wang.Analyzing Peer-to-Peer Traffic across Large Networks[C]//IEEE/ACM Transactions on Networking,NJ : IEEE Press, 2004,219-232.
5M.S.Kim,H.J.Kang,J.W Hong. Towards Peer-to-Peer Traffic Analysis Using Flows[J].Lecture Notes in Computer Science,Springer,Heidelberg, G ermany,2003.10(1 ) :55 -67.