{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T04:33:47Z","timestamp":1743136427867,"version":"3.40.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319155081"},{"type":"electronic","value":"9783319155098"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-15509-8_14","type":"book-chapter","created":{"date-parts":[[2015,3,3]],"date-time":"2015-03-03T07:09:05Z","timestamp":1425366545000},"page":"179-192","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["Distilling the Internet\u2019s Application Mix from Packet-Sampled Traffic"],"prefix":"10.1007","author":[{"given":"Philipp","family":"Richter","sequence":"first","affiliation":[]},{"given":"Nikolaos","family":"Chatzis","sequence":"additional","affiliation":[]},{"given":"Georgios","family":"Smaragdakis","sequence":"additional","affiliation":[]},{"given":"Anja","family":"Feldmann","sequence":"additional","affiliation":[]},{"given":"Walter","family":"Willinger","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,3,4]]},"reference":[{"key":"14_CR1","unstructured":"BitTorrent Protocol Specification v 1.0. https:\/\/wiki.theory.org\/BitTorrentSpecification"},{"key":"14_CR2","unstructured":"Digital Trends article, 12 October 2013. http:\/\/www.digitaltrends.com\/opinion\/bittorrents-image-problem\/"},{"key":"14_CR3","unstructured":"L7-filter. http:\/\/l7-filter.sourceforge.net\/"},{"key":"14_CR4","unstructured":"Sandvine Global Internet Phenomena, 1H 2014. https:\/\/www.sandvine.com\/downloads\/general\/global-internet-phenomena\/"},{"key":"14_CR5","unstructured":"Sandvine Traffic Classification. https:\/\/www.sandvine.com\/technology\/traffic-classification.html"},{"key":"14_CR6","unstructured":"uTorrent Transport Protocol Specification. http:\/\/www.bittorrent.org\/beps\/bep_0029.html"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Ager, B., Chatzis, N., Feldmann, A., Sarrar, N., Uhlig, S., Willinger, W.: Anatomy of a large European IXP. In: ACM SIGCOMM (2012)","DOI":"10.1145\/2342356.2342393"},{"key":"14_CR8","unstructured":"Alcock, S., Nelson, R.: Libprotoident: Traffic classification using lightweight packet inspection. University of Waikato, Technical report (2012)"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Bonfiglio, D., Mellia, M., Meo, M., Ritacca, N., Rossi, D.: Tracking down skype traffic. In: IEEE INFOCOM (2008)","DOI":"10.1109\/INFOCOM.2008.61"},{"issue":"3","key":"14_CR10","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1109\/SURV.2009.090304","volume":"11","author":"A Callado","year":"2009","unstructured":"Callado, A., Kamienski, C., Szabo, G., Gero, B., Kelner, J., Fernandes, S., Sadok, D.: A survey on internet traffic identification. IEEE Commun. Surv. Tutor. 11(3), 37\u201352 (2009)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"14_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/978-3-319-04918-2_10","volume-title":"Passive and Active Measurement","author":"V Carela-Espa\u00f1ol","year":"2014","unstructured":"Carela-Espa\u00f1ol, V., Bujlow, T., Barlet-Ros, P.: Is our ground-truth for traffic classification reliable? In: Faloutsos, M., Kuzmanovic, A. (eds.) PAM 2014. LNCS, vol. 8362, pp. 98\u2013108. Springer, Heidelberg (2014)"},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Czyz, J., Allman, M., Zhang, J., Iekel-Johnson, S., Osterweil, E., Bailey, M.: Measuring IPv6 adoption. In: ACM SIGCOMM (2014)","DOI":"10.1145\/2619239.2626295"},{"issue":"1","key":"14_CR13","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/MNET.2012.6135854","volume":"26","author":"A Dainotti","year":"2012","unstructured":"Dainotti, A., Pescape, A., Claffy, K.: Issues and future directions in traffic classification. IEEE Netw. Mag. 26(1), 35\u201340 (2012)","journal-title":"IEEE Netw. Mag."},{"issue":"3","key":"14_CR14","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1109\/MNET.2011.5772055","volume":"25","author":"A Finamore","year":"2011","unstructured":"Finamore, A., Mellia, M., Meo, M., Munafo, M., Rossi, D.: Experiences of Internet traffic monitoring with Tstat. IEEE Netw. 25(3), 8\u201314 (2011)","journal-title":"IEEE Netw."},{"issue":"5","key":"14_CR15","doi-asserted-by":"publisher","first-page":"1505","DOI":"10.1109\/TNET.2010.2044046","volume":"18","author":"A Finamore","year":"2010","unstructured":"Finamore, A., Mellia, M., Meo, M., Rossi, D.: KISS: Stochastic packet inspection classifier for UDP traffic. IEEE\/ACM Trans. Netw. 18(5), 1505\u20131515 (2010)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"Gerber, A., Doverspike, R.: Traffic types and growth in backbone networks. In: OFC\/NFOEC (2011)","DOI":"10.1364\/OFC.2011.OTuR1"},{"key":"14_CR17","doi-asserted-by":"crossref","unstructured":"Iliofotou, M., Gallagher, B., Eliassi-Rad, T., Xie, G., Faloutsos, M.: Profiling-by-association: A resilient traffic profiling solution for the internet backbone. In: ACM CoNEXT (2010)","DOI":"10.1145\/1921168.1921171"},{"key":"14_CR18","doi-asserted-by":"crossref","unstructured":"Karagiannis, T., Broido, A., Faloutsos, M., claffy, Kc.: Transport layer identification of P2P traffic. In: ACM IMC (2004)","DOI":"10.1145\/1028788.1028804"},{"key":"14_CR19","doi-asserted-by":"crossref","unstructured":"Karagiannis, T., Papagiannaki, K., Faloutsos, M.: BLINC: multilevel traffic classification in the dark. In: ACM SIGCOMM (2005)","DOI":"10.1145\/1080091.1080119"},{"key":"14_CR20","doi-asserted-by":"crossref","unstructured":"Kim, H., Claffy, K., Fomenkov, M., Barman, D., Faloutsos, M., Lee, K.-Y.: Internet traffic classification demystified: Myths, caveats, and the best practices. In: ACM CoNEXT (2008)","DOI":"10.1145\/1544012.1544023"},{"key":"14_CR21","doi-asserted-by":"crossref","unstructured":"Labovitz, C., Lekel-Johnson, S., McPherson, D., Oberheide, J., Jahanian, F.: Internet inter-domain traffic. In: ACM SIGCOMM (2010)","DOI":"10.1145\/1851182.1851194"},{"key":"14_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-28537-0_1","volume-title":"Passive and Active Measurement","author":"C Lee","year":"2012","unstructured":"Lee, C., Lee, D.K., Moon, S.: Unmasking the growing UDP traffic in a campus network. In: Taft, N., Ricciato, F. (eds.) PAM 2012. LNCS, vol. 7192, pp. 1\u201310. Springer, Heidelberg (2012)"},{"key":"14_CR23","doi-asserted-by":"crossref","unstructured":"Maier, G., Feldmann, A., Paxson, V., Allman, M.: On dominant characteristics of residential broadband internet traffic. In: ACM IMC (2009)","DOI":"10.1145\/1644893.1644904"},{"key":"14_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/978-3-540-31966-5_4","volume-title":"Passive and Active Network Measurement","author":"AW Moore","year":"2005","unstructured":"Moore, A.W., Papagiannaki, K.: Toward the accurate identification of network applications. In: Dovrolis, C. (ed.) PAM 2005. LNCS, vol. 3431, pp. 41\u201354. Springer, Heidelberg (2005)"},{"issue":"4","key":"14_CR25","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/SURV.2008.080406","volume":"10","author":"TTT Nguyen","year":"2008","unstructured":"Nguyen, T.T.T., Armitage, G.: A survey of techniques for internet traffic classification using machine learning. IEEE Commun. Surv. Tutor. 10(4), 56\u201376 (2008)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"14_CR26","doi-asserted-by":"crossref","unstructured":"Popa, L., Ghodsi, A., Stoica, I.: HTTP as the narrow waist of the future Internet. In: ACM HotNets (2010)","DOI":"10.1145\/1868447.1868453"},{"key":"14_CR27","doi-asserted-by":"crossref","unstructured":"Richter, P., Smaragdakis, G., Feldmann, A., Chatzis, N., Boettger, J., Willinger, W.: Peering at peerings: On the role of IXP route servers. In: ACM IMC (2014)","DOI":"10.1145\/2663716.2663757"},{"key":"14_CR28","unstructured":"InMon\u2013sFlow. http:\/\/sflow.org\/"},{"key":"14_CR29","doi-asserted-by":"crossref","unstructured":"Valenti, D., Rossi, D., Dainotti, A., Pescap\u00e8, A., Finamore, A., Mellia, M.: Reviewing traffic classification. In: TMA (2013)","DOI":"10.1007\/978-3-642-36784-7_6"},{"key":"14_CR30","doi-asserted-by":"crossref","unstructured":"Wang, L., Kangasharju, J.: Real-world sybil attacks in BitTorrent mainline DHT. In: IEEE GLOBECOM (2012)","DOI":"10.1109\/GLOCOM.2012.6503215"}],"container-title":["Lecture Notes in Computer Science","Passive and Active Measurement"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-15509-8_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T22:33:18Z","timestamp":1676932398000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-15509-8_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319155081","9783319155098"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-15509-8_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"4 March 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}