Traffic Classification Using Clustering Algorithms (2006)

Cached

Download Links

by Jeffrey Erman , Martin Arlitt , Anirban Mahanti
Venue:Proceedings of the ACM SIGCOMM Workshop on Mining Network Data (MineNet
Citations:52 - 5 self

Documents Related by Co-Citation

64 Flow Clustering Using Machine Learning Techniques – Anthony Mcgregor, Mark Hall, Perry Lorier, James Brunskill - 2004
108 Toward the accurate identification of network applications – Andrew W. Moore, Konstantina Papagiannaki - 2005
167 Internet traffic classification using bayesian analysis techniques – Andrew W. Moore, Denis Zuev - 2005
52 ACAS: Automated construction of application signatures – Patrick Haffner, Subhabrata Sen, Oliver Spatscheck, Dongmei Wang - 2005
113 Accurate, scalable in-network identification of p2p traffic using application signatures – S Sen, O Spatscheck, D Wang - 2004
66 Early Application Identification – L Bernaille, R Teixeira, K Salamatian - 2006
134 BLINC: Multilevel Traffic Classification in the Dark – Thomas Karagiannis, Konstantina Papagiannaki, Michalis Faloutsos - 2005
58 Automated traffic classification and application identification using machine learning – S Zander, T Nguyen, G Armitage - 2005
53 A Preliminary Performance Comparison of Five Machine Learning Algorithms for Practical IP Traffic Flow Classification – Nigel Williams, Sebastian Z, Grenville Armitage - 2006
87 Transport Layer Identification of P2P Traffic – Thomas Karagiannis, Andre Broido, Michalis Faloutsos, Kc claffy - 2004
686 Bro: A System for Detecting Network Intruders in Real-Time – Vern Paxson - 1999
34 Unexpected means of protocol inference – J MA, K LEVCHENKO, C KREIBICH, S SAVAGE, G M VOELKER - 2006
83 Class-of-service mapping for QoS: A statistical signature-based approach to IP traffic classification – Matthew Roughan, Subhabrata Sen, Oliver Spatscheck, Nick Duffield - 2004
55 Traffic Classification through Simple Statistical Fingerprinting – Manuel Crotti, Maurizio Dusi, Francesco Gringoli, Luca Salgarelli - 2007
121 Profiling internet backbone traffic: Behavior models and applications – Kuai Xu, Zhi-li Zhang, Supratik Bhattacharyya - 2005
20 Identifying known and unknown peer-to-peer traffic – F Constantinou, P Mavrommatis - 2006
822 Snort - Lightweight Intrusion Detection for Networks – Martin Roesch, Stanford Telecommunications - 1999
26 Unconstrained Endpoint Profiling: Googling the Internet – Ionut Trestian, Aleksandar Kuzmanovic - 2008
23 Identifying and Discriminating Between Web and Peer-to-peer Traffic in the Network Core – J Erman, A Mahanti, M Arlitt, C Williamson - 2007