{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,24]],"date-time":"2024-07-24T07:22:47Z","timestamp":1721805767218},"reference-count":20,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[2012,1]]},"DOI":"10.1016\/j.comnet.2011.09.007","type":"journal-article","created":{"date-parts":[[2011,9,16]],"date-time":"2011-09-16T21:15:24Z","timestamp":1316207724000},"page":"260-272","source":"Crossref","is-referenced-by-count":23,"title":["Session level flow classification by packet size distribution and session grouping"],"prefix":"10.1016","volume":"56","author":[{"given":"Chun-Nan","family":"Lu","sequence":"first","affiliation":[]},{"given":"Chun-Ying","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Ying-Dar","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Yuan-Cheng","family":"Lai","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.comnet.2011.09.007_b0005","unstructured":"C. Fraleigh, S. Moon, B. Lyles, C. Cotton, M. Khan, D. Moll, R. Rockell, T. Seely, C. Diot, Packet-level traffic measurements from the sprint IP backbone in IEEE Network, IEEE Network (2003). Available from: ."},{"key":"10.1016\/j.comnet.2011.09.007_b0010","unstructured":"T. Karagiannis, A. Broido, N. Brownlee, K.C. Claffy, M. Faloutsos, Is P2P dying or just hiding? in: IEEE GLOBECOM, November 2004."},{"key":"10.1016\/j.comnet.2011.09.007_b0015","doi-asserted-by":"crossref","unstructured":"T. Karagiannis, A. Broido, M. Faloutsos, K.C. Claffy, K.C. Transport layer Identification of P2P traffic, in: Internet Measurement Conference(IMC), October 2004.","DOI":"10.1145\/1028788.1028804"},{"key":"10.1016\/j.comnet.2011.09.007_b0020","doi-asserted-by":"crossref","unstructured":"S. Sen, O. Spatscheck, and D. Wang, Accurate, scalable in network identification of P2P traffic using application signatures, in: WWW2004, May 2004.","DOI":"10.1145\/988672.988742"},{"key":"10.1016\/j.comnet.2011.09.007_b0025","unstructured":"M. Roesch, SNORT: Lightweight intrusion detection for networks, in: LISA \u201999: Proceedings of the 13th USENIX Conference on Systems Administration, November 1999."},{"key":"10.1016\/j.comnet.2011.09.007_b0030","doi-asserted-by":"crossref","DOI":"10.1016\/S1389-1286(99)00112-7","article-title":"Bro: a system for detecting network intruders in real-time","author":"Paxson","year":"1999","journal-title":"Computer Networks"},{"key":"10.1016\/j.comnet.2011.09.007_b0035","doi-asserted-by":"crossref","unstructured":"V. Paxson. Empirically derived analytic models of wide-area TCP connections. in: IEEE\/ACM Transactions on Networking, August 1994.","DOI":"10.1109\/90.330413"},{"key":"10.1016\/j.comnet.2011.09.007_b0040","doi-asserted-by":"crossref","unstructured":"V. Paxson, S. Floyd. Wide area traffic: the failure of Poisson modeling, in: IEEE\/ACM Transactions on Networking, June 1995.","DOI":"10.1145\/190314.190338"},{"key":"10.1016\/j.comnet.2011.09.007_b0045","doi-asserted-by":"crossref","unstructured":"C. Dewes, A. Wichmann, A. Feldmann, An analysis of internet chat systems, in: IMC, 2003.","DOI":"10.1145\/948213.948214"},{"key":"10.1016\/j.comnet.2011.09.007_b0050","doi-asserted-by":"crossref","unstructured":"M. Roughan, S. Sen, O. Spatscheck, N. Duffield, Class-of-service mapping for QoS: a Statistical signature-based approach to IP traffic classification, in: IMC, 2004.","DOI":"10.1145\/1028788.1028805"},{"key":"10.1016\/j.comnet.2011.09.007_b0055","doi-asserted-by":"crossref","unstructured":"D.M. Divakaran, H.A. Murthy, T.A. Gonsalves, Traffic modeling and classification using packet train length and packet train size, in: IPOM , 2006.","DOI":"10.1007\/11908852_1"},{"key":"10.1016\/j.comnet.2011.09.007_b0060","doi-asserted-by":"crossref","unstructured":"L. Bernaille, R. Teixeira, I. Akodjenou, A. Soule, K. Salamatian, Traffic classification on the fly, in: ACM SIGCOMM Computer Communication Review, 2006.","DOI":"10.1145\/1129582.1129589"},{"key":"10.1016\/j.comnet.2011.09.007_b0065","doi-asserted-by":"crossref","DOI":"10.1016\/j.jnca.2009.03.001","article-title":"Application classification using packet size distribution port association","author":"Lin","year":"2009","journal-title":"Journal of Network and Computer Applications"},{"key":"10.1016\/j.comnet.2011.09.007_b0070","doi-asserted-by":"crossref","unstructured":"Jayanthkumar Kannan, Jaeyeon Jung, Vern Paxson, Can Emre Koksal, Semi-automated discovery of application session structure, in: IMC, 2006.","DOI":"10.1145\/1177080.1177096"},{"key":"10.1016\/j.comnet.2011.09.007_b0075","doi-asserted-by":"crossref","unstructured":"T. Karagiannis, K. Papagiannaki, M. Faloutsos, BLINC: multilevel traffic classification in the dark, in: Proceedings of the conference on applications, technologies, architectures, and protocols for computer communications SIGCOMM, 2005.","DOI":"10.1145\/1080091.1080119"},{"key":"10.1016\/j.comnet.2011.09.007_b0080","unstructured":"J. Frank, Machine learning and intrusion detection: current and future directions, in: Proceedings of the National 17th Computer Security Conference, 1994."},{"key":"10.1016\/j.comnet.2011.09.007_b0085","doi-asserted-by":"crossref","unstructured":"A. McGregor, M. Hall, P. Lorier, J. Brunskill, Flow clustering using machine learning techniques, in: PAM, 2004.","DOI":"10.1007\/978-3-540-24668-8_21"},{"key":"10.1016\/j.comnet.2011.09.007_b0090","doi-asserted-by":"crossref","unstructured":"S. Zander, T. Nguyen, G. Armitage, Automated traffic classification and application identification using machine learning, in: Proceedings of IEEE Conference on Local Computer Networks (LCN). 2005.","DOI":"10.1109\/LCN.2005.35"},{"key":"10.1016\/j.comnet.2011.09.007_b0095","doi-asserted-by":"crossref","unstructured":"N. Williams, S. Zander, G. Armitrage, A preliminary performance comparison of five machine learning algorithms for practical IP traffic flow classification, in: ACM SIGCOMM Computer Communication Review, October 2006.","DOI":"10.1145\/1163593.1163596"},{"key":"10.1016\/j.comnet.2011.09.007_b0100","doi-asserted-by":"crossref","unstructured":"A. Moore, D. Zuev, Internet traffic classification using Bayesian analysis techniques, in: Proceedings of ACM International Conference on Measurement and Modeling of Computer Systems (SIGMETERICS) 2005.","DOI":"10.1145\/1064212.1064220"}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128611003410?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128611003410?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,6,15]],"date-time":"2019-06-15T19:59:31Z","timestamp":1560628771000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1389128611003410"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,1]]},"references-count":20,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2012,1]]}},"alternative-id":["S1389128611003410"],"URL":"https:\/\/doi.org\/10.1016\/j.comnet.2011.09.007","relation":{},"ISSN":["1389-1286"],"issn-type":[{"value":"1389-1286","type":"print"}],"subject":[],"published":{"date-parts":[[2012,1]]}}}