{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,3]],"date-time":"2025-09-03T10:15:38Z","timestamp":1756894538393,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030801250"},{"type":"electronic","value":"9783030801267"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-80126-7_27","type":"book-chapter","created":{"date-parts":[[2021,7,6]],"date-time":"2021-07-06T11:11:23Z","timestamp":1625569883000},"page":"357-370","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Unsupervised Machine Learning-Based Elephant and Mice Flow Identification"],"prefix":"10.1007","author":[{"given":"Muna","family":"Al-Saadi","sequence":"first","affiliation":[]},{"given":"Asiya","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Vasilios","family":"Kelefouras","sequence":"additional","affiliation":[]},{"given":"David J.","family":"Walker","sequence":"additional","affiliation":[]},{"given":"Bushra","family":"Al-Saadi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,7]]},"reference":[{"key":"27_CR1","first-page":"299","volume":"1","author":"B Suter","year":"1998","unstructured":"Suter, B., Lakshman, T.V., Stiliadis, D., Choudhury, A.K.: Design considerations for supporting TCP with per-flow queueing. Proc. - IEEE INFOCOM 1, 299\u2013306 (1998)","journal-title":"Proc. - IEEE INFOCOM"},{"key":"27_CR2","doi-asserted-by":"crossref","unstructured":"Mogul, J., et al.: DevoFlow: scaling flow management for high-performance networks. In: Conference Papper ACM SIGCOMM Computer Communication Review, pp. 254\u2013265 (2011)","DOI":"10.1145\/2043164.2018466"},{"key":"27_CR3","doi-asserted-by":"crossref","unstructured":"Gude, N., et al.: NOX: towards an operating system for networks. In: ACM SIGCOMM Computer Communication Review Submitt to CCR, vol. 38, no. 3 (2008)","DOI":"10.1145\/1384609.1384625"},{"key":"27_CR4","doi-asserted-by":"crossref","unstructured":"Musumeci, F., et al.: An overview on application of machine learning techniques in optical network. IEEE Commun. Surv. Tutor. 21(2), (2019). Second","DOI":"10.1109\/COMST.2018.2880039"},{"issue":"4","key":"27_CR5","doi-asserted-by":"publisher","first-page":"326","DOI":"10.4103\/0377-2063.118021","volume":"59","author":"S Dong","year":"2013","unstructured":"Dong, S., Ding, W., Gong, J., Zhou, D.: Flow cluster algorithm based on improved K-means method. IETE J. Res. 59(4), 326 (2013)","journal-title":"IETE J. Res."},{"key":"27_CR6","doi-asserted-by":"crossref","unstructured":"Singh, H.: Performance analysis of unsupervised machine learning techniques for network traffic classification. 2015 Fifth International Conference on Advance Computer Communication Technology, pp. 401\u2013404 (2015)","DOI":"10.1109\/ACCT.2015.54"},{"issue":"1","key":"27_CR7","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1109\/TPDS.2012.98","volume":"24","author":"J Zhang","year":"2013","unstructured":"Zhang, J., Xiang, Y., Wang, Y., Zhou, W., Xiang, Y., Guan, Y.: Network traffic classification using correlation information. IEEE Trans. Parallel Distrib. Syst. 24(1), 104\u2013117 (2013)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"5","key":"27_CR8","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1016\/j.jcss.2012.11.004","volume":"79","author":"J Zhang","year":"2013","unstructured":"Zhang, J., Xiang, Y., Zhou, W., Wang, Y.: Unsupervised traffic classification using flow statistical properties and IP packet payload. J. Comput. Syst. Sci. 79(5), 573\u2013585 (2013)","journal-title":"J. Comput. Syst. Sci."},{"key":"27_CR9","doi-asserted-by":"crossref","unstructured":"Oudah, H., Ghita, B., Bakhshi, T., Alruban, A., Walker, D.J.: Using burstiness for network applications classification. J. Comput. Networks Commun. 2019 (2019)","DOI":"10.1155\/2019\/5758437"},{"key":"27_CR10","doi-asserted-by":"crossref","unstructured":"Bujlow, T., Riaz, T., Pedersen, J.M.: A method for classification of network traffic based on C5.0 machine learning algorithm. In: 2012 International Conference on Computing, Networking and Communications ICNC 2012, pp. 237\u2013241 (2012)","DOI":"10.1109\/ICCNC.2012.6167418"},{"issue":"SUPPL. 2","key":"27_CR11","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1016\/S1005-8885(09)60577-X","volume":"17","author":"GZ Lin","year":"2010","unstructured":"Lin, G.Z., Xin, Y., Niu, X.X., Jiang, H.B.: Network traffic classification based on semi-supervised clustering. J. China Univ. Posts Telecommun. 17(SUPPL. 2), 84\u201388 (2010)","journal-title":"J. China Univ. Posts Telecommun."},{"key":"27_CR12","doi-asserted-by":"crossref","unstructured":"Terzi, D.S., Terzi, R., Sagiroglu, S.: Big data analytics for network anomaly detection from netflow data. In: 2nd International Conference on Computer Science Engineering UBMK 2017, no. January 2017, pp. 592\u2013597 (2017)","DOI":"10.1109\/UBMK.2017.8093473"},{"issue":"October","key":"27_CR13","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1016\/j.cose.2018.10.007","volume":"80","author":"M Gratian","year":"2019","unstructured":"Gratian, M., Bhansali, D., Cukier, M., Dykstra, J.: Identifying infected users via network traffic. Comput. Secur. 80(October), 306\u2013316 (2019)","journal-title":"Comput. Secur."},{"key":"27_CR14","doi-asserted-by":"crossref","unstructured":"Al-Saadi, M., Ghita, B.V., Shiaeles, S., Sarigiannidis, P.: A novel approach for performance-based clustering and management of network traffic flows. In: 2019 15th International Wireless Communication Mobile Computer Conference (IWCMC). IEEE Publication (2019)","DOI":"10.1109\/IWCMC.2019.8766728"},{"key":"27_CR15","unstructured":"Chhabra, A., Kiran, M.: Classifying Elephant and Mice Flows in High-Speed Scientific Networks, Prepr. Submitt. to INDIS, 19 September 2017"},{"key":"27_CR16","doi-asserted-by":"publisher","unstructured":"Ben Basat, R., Einziger, G., Friedman, R., Kassner, Y.: Optimal elephant flow detection. IEEE Trans. Cloud Comput. (2019). https:\/\/doi.org\/10.1109\/TCC.2019.2901669","DOI":"10.1109\/TCC.2019.2901669"},{"key":"27_CR17","doi-asserted-by":"crossref","unstructured":"Wu, X., Yang, X.: DARD: distributed adaptive routing for datacenter networks. In: Proceedings - International Conference on Distributed Computing Systems, pp. 32\u201341 (2012)","DOI":"10.1109\/ICDCS.2012.69"},{"key":"27_CR18","doi-asserted-by":"crossref","unstructured":"Wang, W., Sun, Y., Zheng, K., Kaafar, M.A., Li, D., Li, Z.: Concise Paper: Freeway: Adaptively Isolating the Elephant and Mice Flows on Different Transmission Paths (2014)","DOI":"10.1109\/ICNP.2014.59"},{"key":"27_CR19","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1016\/j.comnet.2016.06.003","volume":"105","author":"W Cui","year":"2016","unstructured":"Cui, W., Yu, Y., Qian, C.: DiFS: distributed flow Scheduling for adaptive switching in FatTree data center networks. Comput. Networks 105, 166\u2013179 (2016)","journal-title":"Comput. Networks"},{"key":"27_CR20","unstructured":"Ostermann, S.: tcptrace. http:\/\/www.tcptrace.org\/. Accessed 01 Oct 2018"},{"key":"27_CR21","unstructured":"\u201cA Story of Mice and Elephants: Dynamic Packet Prioritization|No Jitter.\u201d https:\/\/www.nojitter.com\/story-mice-and-elephants-dynamic-packet-prioritization. Accessed 27 Aug 2020"}],"container-title":["Lecture Notes in Networks and Systems","Intelligent Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-80126-7_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,6]],"date-time":"2021-07-06T11:19:46Z","timestamp":1625570386000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-80126-7_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030801250","9783030801267"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-80126-7_27","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"7 July 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}