|
[1] S. Sen, O. Spatsheck, and D. Wang, “Accurate, Scalable In-Network Identification of P2P Traffic Using Application Signatures”, Proceeding of the 13th International World Wide Web Conference, pp.512-521, NY, USA, May 2004 [2] Liu Bin, Li Zhitang, and Li Zhanchun, “Traffic Measurement of Bittorrent System Based on Netfilter”, Computational intelligence and security, 2006 international conference on [3] Alok Madhukar, Carey Williamson, “A Longitudinal Study of P2P Traffic Classification”, Proceedings of the 14th IEEE international Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS’06) [4] 楊竹星,陳建華,”基於Linux Netfilter 的通訊協定分類器之設計與實作”,國立中 山大學資訊工程學系,碩士論文,2006 年7 月 [5] Linux Netfilter, HTTP://www.netfilter.org/ [6] L7-filter, http://l7-filter.sourceforge.net/ [7] IPP2P, http://www.ipp2p.org/ [8] IANA, IANA port number list, http://www.iana.org/assignments/port-numbers [9] Thomas Karagiannis, UC Riverside; Andre Broido, CAIDA, SDSC; Michalis Faloutsos, UC Riverside; Kc claffy, CAIDA, SDSC. ”Transport Layer of P2P Traffic”, IMC2004 [10] A. Moore and K. Papagiannaki, “Toward the Accurate Identification of Network Applications”, Passive and Active Measurements Workshop, Boston, MA, USA, March 31, April 1, 2005 [11] C.Cranor, T. Johnson, and O. Spatscheck. Gigascope: a stream database for network applications. In SIGMOD, June 2003 [12] Service Control Engine, http://www.cisco.com/en/US/products/ps6150/index.html [13] Cisco, http://www.cisco.com [14] SCA BB:RDR 格式, http: //www.cisco.com/univercd/cc/td/doc/product/cable/svc_ctrl/scappsbb/bbrg305.htm [15] RFC 3549 - Linux Netlink as an IP Services Protocol, HTTP: //www.rfc-archive.org/getrfc.php?rfc=3549 [16] C. S. Yang, P. C. Wu, "A Fast Multi-pattern Matching Algorithm for Network Processor", National Sun Yat-sen University, Department of Computer Science and Engineering, Master Thesis, June 2006 [17] 蔡文能,賴俊廷,”P2P軟體對網路影響之研究”,國立交通大學資訊工程學系, 碩士論文,2004年10月 [18] tcpdump/libcap http://www.tcpdump.org/ [19] Young J.Won, Byung-Chul Part, Hong-Taek Ju, Myung-Sup Kim, James W.Hong,” A Hybrid Approach for Accurate Application Traffic Identification”, End-to-End Monitoring Techniques and Services, 2006 4th IEEE/IFIP Workshop on [20] Demetres Antoniades, Michalis Polychronakis, Spiros Antonatos, Evangelos P. Markatos, Sven Ubik, and Arne Øslebø, “Appmon: An Application for Accurate per Application Network Traffic Characterization”, BroadBand Europe Geneva, Switzerland 11-14 December 2006 [21] Angelo Spognardi, Alessandro Lucarelli, Roberto Di Pietro, ”A Methodology for P2P File-Sharing Traffic Detection”, Proceedings of the 2005 Second International Workshop on Hot Topics in Peer-to-Peer Systems [22] T. Karagiannis, K. Papagiannaki, and M. Faloutsos, “BLINC: Multilevel Traffic Classification in the Dark”, ACM SIGCOMM, Philadelphia, PA, August 2005 [23] S. Sen and J. Wang.,” Analyzing peer-to-peer traffic across large networks”,IEEE/ACM Trans. Netw., 12(2):219-232, 2004 [24] Laurent Bernaille, Renata Teixeira, Kavé Salamatian, “ Early Application Identification”, CONEXT’06 Lisboa, Portual 2006 ACM [25] Nigel Williams, Sebastian Zander, Grenville Armitage. “Evaluating Machine Learning Algorithms for Automated Network Application Identification”, CAIA Technical Report, March 2006 [26] A. Moore and D. Zuev. “Internet Traffic Classification Using Bayesian Analysis Techniques”, in SIGMETRICS’05, Banff. Canada. June 6-10,2005 [27] Jeffrey Erman, Anirban Mahanti, and Martin Arlitt, “Internet Traffic Identification using Machine Learning”, Proc. of 49th IEEE Global Telecommunications Conference (GLOBECOM), San Francisco, USA, November 2006. [28] ethereal, www.ethereal.com
|