{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T10:32:13Z","timestamp":1761647533573},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540768081"},{"type":"electronic","value":"9783540768098"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-76809-8_14","type":"book-chapter","created":{"date-parts":[[2007,10,31]],"date-time":"2007-10-31T14:29:38Z","timestamp":1193840978000},"page":"156-166","source":"Crossref","is-referenced-by-count":5,"title":["Implementation Issues of Early Application Identification"],"prefix":"10.1007","author":[{"given":"Laurent","family":"Bernaille","sequence":"first","affiliation":[]},{"given":"Renata","family":"Teixeira","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","doi-asserted-by":"crossref","unstructured":"Karagiannis, T., Broido, A., Brownlee, N., Claffy, K., Faloutsos, M.: Is P2P dying or just hiding? In: IEEE Globecom (2004)","DOI":"10.1109\/GLOCOM.2004.1378239"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"Roughan, M., Sen, S., Spatscheck, O., Duffield, N.: Class-of-service mapping for QoS: A statistical signature-based approach to ip traffic classification. In: Proceedings of ACM Internet Measurement Conference (2004)","DOI":"10.1145\/1028788.1028805"},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Moore, A., Zuev, D.: Internet traffic classification using bayesian analysis. In: Proceedings of ACM SIGMETRICS (2005)","DOI":"10.1145\/1064212.1064220"},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Karagiannis, T., Papagiannaki, D., Faloutsos, M.: Blinc: Multilevel traffic classification in the dark. In: Proceedings of ACM SIGCOMM (2005)","DOI":"10.1145\/1080091.1080119"},{"key":"14_CR5","doi-asserted-by":"crossref","first-page":"2435","DOI":"10.1016\/S1389-1286(99)00112-7","volume":"31","author":"V. Paxson","year":"1999","unstructured":"Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer Networks 31, 2435\u20132463 (1999)","journal-title":"Computer Networks"},{"key":"14_CR6","unstructured":"Snort: http:\/\/www.snort.org"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Ma, J., Levchenko, K., Kreibich, C., Savage, S.: G M Voelker: Unexpected means of protocol inference. In: Proceedings of ACM Internet Measurement Confererence (2006)","DOI":"10.1145\/1177080.1177123"},{"key":"14_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1007\/978-3-540-24668-8_21","volume-title":"Passive and Active Network Measurement","author":"A. McGregor","year":"2004","unstructured":"McGregor, A., Hall, M., Lorier, P., Brunskill, J.: Flow clustering using machine learning techniques. In: Barakat, C., Pratt, I. (eds.) PAM 2004. LNCS, vol.\u00a03015, pp. 205\u2013214. Springer, Heidelberg (2004)"},{"key":"14_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1007\/978-3-540-31966-5_25","volume-title":"Passive and Active Network Measurement","author":"D. Zuev","year":"2005","unstructured":"Zuev, D., Moore, A.W.: Traffic classification using a statistical approach. In: Dovrolis, C. (ed.) PAM 2005. LNCS, vol.\u00a03431, pp. 321\u2013324. Springer, Heidelberg (2005)"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Bernaille, L., Teixeira, R., Salamatian, K.: Early application identification. In: Conference on Future Networking Technologies, CoNext (2006)","DOI":"10.1145\/1368436.1368445"},{"key":"14_CR11","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1145\/1015467.1015495","volume-title":"Proceedings of ACM SIGCOMM","author":"C. Estan","year":"2004","unstructured":"Estan, C., Keys, K., Moore, D., Varghese, G.: Building a better netflow. In: Proceedings of ACM SIGCOMM, pp. 245\u2013256. ACM Press, New York (2004)"},{"key":"14_CR12","unstructured":"IPMON: http:\/\/ipmon.sprintlabs.com"},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"Boyer, R., Moore, J.: A fast string searching algorithm. Communications of the ACM (1977)","DOI":"10.1145\/359842.359859"},{"key":"14_CR14","unstructured":"Valgrind: http:\/\/valgrind.org\/"},{"key":"14_CR15","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1145\/1185347.1185360","volume-title":"Proceedings of the ACM\/IEEE Symposium on Architecture for networking and communications systems","author":"F. Yu","year":"2006","unstructured":"Yu, F., Chen, Z., Diao, Y., Lakshman, T.V., Katz, R.H.: Fast and memory-efficient regular expression matching for deep packet inspection. In: Proceedings of the ACM\/IEEE Symposium on Architecture for networking and communications systems, pp. 93\u2013102. ACM Press, New York (2006)"},{"key":"14_CR16","unstructured":"Dreger, H., Mai, M., Feldmann, A., Paxson, V., Sommer, R.: Dynamic application-layer protocol analysis for network intrusion detection. In: Usenix Security Symposium (2006)"},{"key":"14_CR17","unstructured":"l7filter: http:\/\/l7-filter.sourceforge.net\/"},{"key":"14_CR18","unstructured":"gprof: http:\/\/www.gnu.org\/software\/binutils\/manual\/gprof-2.9.1\/"},{"key":"14_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/978-3-540-71617-4_17","volume-title":"Passive and Active Network Measurement","author":"L. Bernaille","year":"2007","unstructured":"Bernaille, L., Teixeira, R.: Early recognition of encrypted applications. In: Uhlig, S., Papagiannaki, K., Bonaventure, O. (eds.) PAM 2007. LNCS, vol.\u00a04427, pp. 165\u2013175. Springer, Heidelberg (2007)"}],"container-title":["Lecture Notes in Computer Science","Sustainable Internet"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-76809-8_14.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,14]],"date-time":"2023-05-14T15:46:09Z","timestamp":1684079169000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-76809-8_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540768081","9783540768098"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-76809-8_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}