{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T16:45:14Z","timestamp":1732034714085},"reference-count":71,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Surv. Tutorials"],"published-print":{"date-parts":[[2014]]},"DOI":"10.1109\/surv.2013.100613.00161","type":"journal-article","created":{"date-parts":[[2013,10,23]],"date-time":"2013-10-23T18:10:24Z","timestamp":1382551824000},"page":"1135-1156","source":"Crossref","is-referenced-by-count":242,"title":["A Survey of Payload-Based Traffic Classification Approaches"],"prefix":"10.1109","volume":"16","author":[{"given":"Michael","family":"Finsterbusch","sequence":"first","affiliation":[]},{"given":"Chris","family":"Richter","sequence":"additional","affiliation":[]},{"given":"Eduardo","family":"Rocha","sequence":"additional","affiliation":[]},{"given":"Jean-Alexander","family":"Muller","sequence":"additional","affiliation":[]},{"given":"Klaus","family":"Hanssgen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2012.6135854"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2010.5466645"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2011.231"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2009.90"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5061946"},{"key":"ref32","first-page":"1","article-title":"StriD2FA: Scalable Regular Expression Matching for Deep Packet Inspection","author":"wang","year":"2011","journal-title":"Communications (ICC) 2011 IEEE International Conference on"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2008.138"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2006.315851"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2009.5235313"},{"key":"ref36","year":"0","journal-title":"(2013 March) Application Layer Packet Classifier for Linux"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2009.5072188"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/872757.872770"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/1851275.1851188"},{"key":"ref62","year":"0","journal-title":"Amsterdam Internet Exchange (AMS-IX) (2013 March) Statistics"},{"key":"ref61","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1007\/978-3-642-28534-9_3","article-title":"Internet access traffic measurement and analysis","author":"gebert","year":"2012","journal-title":"4th International Conference on Traffic Monitoring and Analysis"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS.2009.4919635"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2010.5735770"},{"key":"ref64","author":"david","year":"2005","journal-title":"Computer Organization and Design - The Hardware\/Software Interface"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2008.4575121"},{"key":"ref65","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1007\/978-3-642-01645-5_8","article-title":"TIE: A Community-Oriented Traffic Classification Platform","author":"dainotti","year":"2009","journal-title":"Proceedings of International Workshop on Traffic Monitoring and Analysis"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/1198255.1198257"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2010.2044046"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2011.5963023"},{"key":"ref68","article-title":"Pair-wise Similarity Criteria for Flows Identification in P2P\/non-P2P TRaffic Classification","author":"camacho p\u00e1ez","year":"2011","journal-title":"AP2PS 2011 the Third International Conference on Advances in P2P Systems"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2005.02.008"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2009.090304"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2008.080406"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1815396.1815569"},{"key":"ref22","article-title":"Generic Attributes for Skype Identification Using Machine Learning","author":"jesudasan","year":"2010","journal-title":"Centre for Advanced Internet Architectures Swinburne University of Technology Melbourne Australia Tech Rep 100820A"},{"key":"ref21","article-title":"Cisco Systems NetFlow Services Export Version 9","author":"claise","year":"2004","journal-title":"RFC 3954 (Informational) Internet Engineering Task Force"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1656274.1656278"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1109\/LCN.2006.322122","article-title":"Training on multiple sub-flows to optimise the use of Machine Learning classifiers in real-world IP networks","author":"nguyen","year":"2006","journal-title":"Local Computer Networks Proceedings 2006 31st IEEE Conference on"},{"key":"ref26","article-title":"Real Time VoIP Traffic Classification","author":"do","year":"2009","journal-title":"CAIA Technical Report"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1542245.1542266"},{"key":"ref50","year":"0","journal-title":"(2013 March) nDPI"},{"key":"ref51","year":"0","journal-title":"(2013 March) HiPPIE - Linux Software"},{"key":"ref59","year":"0","journal-title":"WAND Team (2013 March) Auckland IX"},{"key":"ref58","article-title":"Dynamic Updates in the Domain Name System (DNS UPDATE)","author":"vixie","year":"0","journal-title":"RFC 2136 (Proposed Standard) Internet Engineering Task Force Apr 1997 updated by RFCs 3007 4035 4033 4034"},{"key":"ref57","article-title":"RTP: A Transport Protocol for Real-Time Applications","author":"schulzrinne","year":"0","journal-title":"RFC 3550 (Standard) Internet Engineering Task Force Jul 2003 updated by RFCs 5506 5761 6051 6222"},{"key":"ref56","year":"0","journal-title":"(2013 March) TCPDUMP & LibPCAP project homepage"},{"key":"ref55","year":"0","journal-title":"(2013 March) Performance Application Programming Interface"},{"key":"ref54","year":"0","journal-title":"(2013 March) Official IPP2P homepage"},{"key":"ref53","article-title":"Libprotoident: Traffic Classification Using Lightweight Packet Inspection","author":"alcock","year":"2012","journal-title":"WAND Network Research Group Tech Rep"},{"key":"ref52","year":"0","journal-title":"(2013 March) WAND Network Research Group"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1007\/978-3-540-31966-5_4","article-title":"Toward the Accurate Identification of Network Applications","volume":"3431","author":"moore","year":"2005","journal-title":"Passive and Active Network Measurement"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOTS.2006.6"},{"key":"ref40","first-page":"229","article-title":"Snort - Lightweight Intrusion Detection for Networks","author":"roesch","year":"1999","journal-title":"USENIX 13th Systems Administration Conference - LISA'99"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298307"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21484-4_21"},{"key":"ref14","first-page":"65","article-title":"Traffic Classification Based on Flow Similarity","author":"chung","year":"2009","journal-title":"Proc 9th IEEE International Workshop on IP Operations and Management"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICEIE.2010.5559900"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2011.5962651"},{"key":"ref17","author":"witten","year":"2011","journal-title":"Data Mining Practical Machine Learning Tools and Techniques"},{"key":"ref18","first-page":"146","article-title":"Towards a Flow-based Internet Traffic Classification for Bandwidth Optimization","volume":"3","author":"mohd","year":"2009","journal-title":"International Journal of Computer Science and Security (IJCSS)"},{"key":"ref19","article-title":"Parameter Estimation for Heuristic Based Internet Traffic Classification","author":"finsterbusch","year":"2012","journal-title":"ICIMP 2012 The Seventh International Conference on Internet Monitoring and Protection IARIA"},{"key":"ref4","author":"johnson","year":"0","journal-title":"(2012 December) Data Deluge motivates ITU standard on Deep Packet Inspection ITU"},{"key":"ref3","year":"0","journal-title":"(2013 May) PACE – Protocol and Application Classification Engine"},{"key":"ref6","year":"0","journal-title":"(2013 March) IANA Port Numbers"},{"key":"ref5","year":"0","journal-title":"ITU (2013 April) ITU-T SG13 Future networks including cloud computing mobile and next-generation networks ITU"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ASAP.2009.17"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5061972"},{"key":"ref49","year":"0","journal-title":"(2013 March) OpenDPI org"},{"key":"ref9","article-title":"A Scalable Pipeline Architecture for Line Rate Packet Classification on FPGAs","author":"jeffrey","year":"2009","journal-title":"21st Intl Conf on Parallel and Distributed Computing and Systems (PDCS '09)"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2007.12"},{"key":"ref45","first-page":"14:1","article-title":"Discoverer: automatic protocol reverse engineering from network traces","author":"cui","year":"2007","journal-title":"SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/1544012.1544023"},{"key":"ref47","year":"0","journal-title":"(2013 March) Wireshark project homepage"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.312"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2008.1097"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356565"},{"key":"ref43","year":"0","journal-title":"(2013 March) Network Based Application Recognition (NBAR) Cisco®"}],"container-title":["IEEE Communications Surveys & Tutorials"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9739\/6811383\/06644335.pdf?arnumber=6644335","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:25:57Z","timestamp":1642004757000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6644335\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"references-count":71,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/surv.2013.100613.00161","relation":{},"ISSN":["1553-877X"],"issn-type":[{"value":"1553-877X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]}}}