{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,30]],"date-time":"2024-07-30T19:11:09Z","timestamp":1722366669295},"reference-count":27,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2016,12,1]],"date-time":"2016-12-01T00:00:00Z","timestamp":1480550400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Network and Computer Applications"],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1016\/j.jnca.2016.09.013","type":"journal-article","created":{"date-parts":[[2016,10,18]],"date-time":"2016-10-18T04:57:50Z","timestamp":1476766670000},"page":"60-74","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":21,"special_numbering":"C","title":["High performance traffic classification based on message size sequence and distribution"],"prefix":"10.1016","volume":"76","author":[{"given":"Chun-Nan","family":"Lu","sequence":"first","affiliation":[]},{"given":"Chun-Ying","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Ying-Dar","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Yuan-Cheng","family":"Lai","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.jnca.2016.09.013_bib1","doi-asserted-by":"crossref","unstructured":"Azzouna, N.B., Guillemin, F., 2003. Analysis of ADSL traffic on an IP backbone link. In: Proceedings of the IEEE global Telecommunication Conference (GLOBECOM\u201903), pp. 3742\u20133746.","DOI":"10.1109\/GLOCOM.2003.1258932"},{"issue":"2","key":"10.1016\/j.jnca.2016.09.013_bib2","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1145\/1129582.1129589","article-title":"Traffic classification on the fly","volume":"36","author":"Bernaille","year":"2006","journal-title":"Proc. ACM SIGCOMM Comput. Commun. Rev."},{"key":"10.1016\/j.jnca.2016.09.013_bib3","first-page":"350","author":"Cormen","year":"2003","journal-title":"Introd. Algorithms"},{"key":"10.1016\/j.jnca.2016.09.013_bib4","unstructured":"DARPA Intrusion Detection Evaluation Data Set, Available at: \u3008http:\/\/www.ll.mit.edu\/mission\/communications\/cyber\/CSTcorpora\/ideval\/data\/1999data.html\u3009."},{"key":"10.1016\/j.jnca.2016.09.013_bib5","doi-asserted-by":"crossref","unstructured":"Dewes, C., Wichmann,\u00a0A., Feldmann, A., 2003.\u00a0An analysis of internet chat systems. In: Proceedings Third ACM SIGCOMM Conference Internet Measurement (IMC\u201903), pp. 51\u201364.","DOI":"10.1145\/948205.948214"},{"key":"10.1016\/j.jnca.2016.09.013_bib6","doi-asserted-by":"crossref","unstructured":"Diainotti, A., de Donato, W., Pescape, A., Salvo Rossi ,\u00a0P., 2008. Classification of network traffic via packet-level hidden markov models. In: Proceedings of IEEE Global Telecommunication Conference (GLOBECOM\u201908), pp. 1\u20135.","DOI":"10.1109\/GLOCOM.2008.ECP.412"},{"key":"10.1016\/j.jnca.2016.09.013_bib7","doi-asserted-by":"crossref","unstructured":"Divakaran, D.M., Murthy, H.A., Gonsalves, T.A., 2006. Traffic modeling and classification using packet train length and packet train size. In: Proceedings Sixth IEEE Conference IP Operartional Management (IPOM\u201906), pp. 1\u201312.","DOI":"10.1007\/11908852_1"},{"key":"10.1016\/j.jnca.2016.09.013_bib8","first-page":"13","article-title":"On the stability of the information carried by traffic flow features at the packet level","author":"Este","year":"2009","journal-title":"In: Proceedings of the ACM SIGCOMM Computer Communication Reviews"},{"key":"10.1016\/j.jnca.2016.09.013_bib9","unstructured":"Frank, J., 1994. Machine learning and intrusion detection: current and future. In: Proceedings of the 17th National Computer Security Conference."},{"key":"10.1016\/j.jnca.2016.09.013_bib10","unstructured":"GHMM General Hidden Markov Model Library, Available at \u3008http:\/\/bioinformatics.rutgers.edu\/Software\/GHMM\/\u3009"},{"issue":"3","key":"10.1016\/j.jnca.2016.09.013_bib11","doi-asserted-by":"crossref","DOI":"10.1145\/2480741.2480747","article-title":"Detection and classification of peer-to-peer traffic: a survey","volume":"45","author":"Gomes","year":"2013","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"10.1016\/j.jnca.2016.09.013_bib12","doi-asserted-by":"crossref","unstructured":"Kannan, J., Jung J., Paxson, V., Koksal C.E., 2006. Semi-automated discovery of application session structure. In: Proceedings of the Sixth ACM SIGCOMM Conference on Internet Measurement (IMC\u201906), pp. 119\u2013132.","DOI":"10.1145\/1177080.1177096"},{"key":"10.1016\/j.jnca.2016.09.013_bib13","doi-asserted-by":"crossref","unstructured":"Karagiannis, T., Papagiannaki,\u00a0K., Faloutsos, M., 2005. BLINC: multilevel traffic classification in the dark. In: Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (SIGCOMM\u201905), pp. 229\u2013240.","DOI":"10.1145\/1080091.1080119"},{"key":"10.1016\/j.jnca.2016.09.013_bib14","unstructured":"L7-filter, Available at \u3008http:\/\/l7-filter.clearfoundation.com\u3009."},{"issue":"5","key":"10.1016\/j.jnca.2016.09.013_bib15","doi-asserted-by":"crossref","first-page":"1023","DOI":"10.1016\/j.jnca.2009.03.001","article-title":"Application classification using packet size distribution and port association","volume":"32","author":"Lin","year":"2009","journal-title":"J. Netw. Comput. Appl."},{"issue":"1","key":"10.1016\/j.jnca.2016.09.013_bib16","doi-asserted-by":"crossref","first-page":"260","DOI":"10.1016\/j.comnet.2011.09.007","article-title":"Session level flow classification by packet size distribution and session grouping","volume":"56","author":"Lu","year":"2012","journal-title":"Comput. Netw."},{"key":"10.1016\/j.jnca.2016.09.013_bib17","first-page":"55","article-title":"Internet traffic classification using bayesian analysis techniques","author":"Moore","year":"2005","journal-title":"In: Proceedings of the ACM SIGMETRICS Conference on Measurement Modeling and Computer System (SIGMETRICS\u201905)"},{"key":"10.1016\/j.jnca.2016.09.013_bib18","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1007\/978-3-642-12365-8_10","article-title":"TCP traffic classification using markov models","author":"Munz","year":"2010","journal-title":"Proceedings Second Conference Traffic Monitoring and Analaysis (TMA\u201910)"},{"issue":"4","key":"10.1016\/j.jnca.2016.09.013_bib19","doi-asserted-by":"crossref","first-page":"316","DOI":"10.1109\/90.330413","article-title":"Empirically derived analytic models of wide-area TCP connections","volume":"2","author":"Paxson","year":"1994","journal-title":"IEEE\/ACM Trans. Netwon (TON)"},{"key":"10.1016\/j.jnca.2016.09.013_bib20","doi-asserted-by":"crossref","first-page":"252","DOI":"10.1016\/j.neucom.2014.12.053","article-title":"Effective packet number for early stage internet traffic identification","volume":"156","author":"Peng","year":"2015","journal-title":"Neurocomputing"},{"key":"10.1016\/j.jnca.2016.09.013_bib21","first-page":"135","article-title":"Class-of-service mapping for QoS: a statistical signature-based approach to IP traffic classification","author":"Roughan","year":"2004","journal-title":"In: Proceedings of the Fourth ACM SIGCOMM Conference on Internet Measurement (IMC\u201904)"},{"key":"10.1016\/j.jnca.2016.09.013_bib22","first-page":"512","article-title":"Accurate, scalable in-network identification of P2P traffic using application signatures","author":"Sen","year":"2004","journal-title":"In: Proceedings of the 13th Conference on World Wide Web (WWW\u201904)"},{"key":"10.1016\/j.jnca.2016.09.013_bib23","first-page":"9","article-title":"HMM profiles for network traffic classification","author":"Wright","year":"2004","journal-title":"In: Proceedings of the ACM Workshop Visual Data Mining Computer Security (VizSEC\/DMSEC\u201904)"},{"issue":"1","key":"10.1016\/j.jnca.2016.09.013_bib24","doi-asserted-by":"crossref","DOI":"10.1109\/TPDS.2012.98","article-title":"Network traffic classification using correlation information","volume":"24","author":"Zhang","year":"2013","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"1","key":"10.1016\/j.jnca.2016.09.013_bib25","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1109\/TIFS.2012.2223675","article-title":"Internet traffic classification by aggregating correlated na\u00efve bayes predictions","volume":"8","author":"Zhang","year":"2013","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"10.1016\/j.jnca.2016.09.013_bib26","article-title":"An effective network traffic classification method with unknown flow detection","volume":"10","author":"Zhang","year":"2013","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"issue":"4","key":"10.1016\/j.jnca.2016.09.013_bib27","doi-asserted-by":"crossref","first-page":"1257","DOI":"10.1109\/TNET.2014.2320577","article-title":"Robust network traffic classification","volume":"23","author":"Zhang","year":"2015","journal-title":"IEEE\/ACM Trans. Netw."}],"container-title":["Journal of Network and Computer Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S108480451630220X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S108480451630220X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2018,9,7]],"date-time":"2018-09-07T13:50:01Z","timestamp":1536328201000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S108480451630220X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":27,"alternative-id":["S108480451630220X"],"URL":"https:\/\/doi.org\/10.1016\/j.jnca.2016.09.013","relation":{},"ISSN":["1084-8045"],"issn-type":[{"value":"1084-8045","type":"print"}],"subject":[],"published":{"date-parts":[[2016,12]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"High performance traffic classification based on message size sequence and distribution","name":"articletitle","label":"Article Title"},{"value":"Journal of Network and Computer Applications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jnca.2016.09.013","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2016 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}]}}