{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T10:33:13Z","timestamp":1725532393692},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642013980"},{"type":"electronic","value":"9783642013997"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-01399-7_11","type":"book-chapter","created":{"date-parts":[[2009,5,6]],"date-time":"2009-05-06T01:18:41Z","timestamp":1241572721000},"page":"131-144","source":"Crossref","is-referenced-by-count":4,"title":["Identify P2P Traffic by Inspecting Data Transfer Behaviour"],"prefix":"10.1007","author":[{"given":"Mingjiang","family":"Ye","sequence":"first","affiliation":[]},{"given":"Jianping","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Ke","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Dah Ming","family":"Chiu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Moore, A., Papagiannaki, K.: Toward the Accurate Identification of Network Applications. In: Passive and Active Measurements Workshop, Boston, MA, USA, March 31- April 1 (2005)","key":"11_CR1","DOI":"10.1007\/978-3-540-31966-5_4"},{"doi-asserted-by":"crossref","unstructured":"Sen, S., Spatscheck, O., Wang, D.: Accurate, Scalable In-Network Identification of P2P Traffic Using Application Signatures. In: Proc. of ACM WWW 2004 (2004)","key":"11_CR2","DOI":"10.1145\/988672.988742"},{"key":"11_CR3","first-page":"197","volume-title":"Proceedings of the 2005 ACM SIGCOMM Workshop on Mining Network Data 2005","author":"P. Haffner","year":"2005","unstructured":"Haffner, P., Sen, S., Spatscheck, O., Wang, D.: ACAS: automated construction of application signatures. In: Proceedings of the 2005 ACM SIGCOMM Workshop on Mining Network Data 2005, pp. 197\u2013202. ACM, New York (2005)"},{"key":"11_CR4","first-page":"313","volume-title":"Proceedings of the 6th ACM SIGCOMM Conference on internet Measurement 2006","author":"J. Ma","year":"2006","unstructured":"Ma, J., Levchenko, K., Kreibich, C., Savage, S., Voelker, G.M.: Unexpected means of protocol inference. In: Proceedings of the 6th ACM SIGCOMM Conference on internet Measurement 2006, pp. 313\u2013326. ACM, New York (2006)"},{"doi-asserted-by":"crossref","unstructured":"Erman, J., Mahanti, A., Arlitt, M., Cohen, I., Williamson, C.: Semi-supervised network traffic classification. In: Proceedings of the 2007 ACM SIGMETRICS (2007)","key":"11_CR5","DOI":"10.1145\/1254882.1254934"},{"key":"11_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/978-3-540-24668-8_21","volume-title":"Passive and Active Network Measurement","author":"A. McGregor","year":"2004","unstructured":"McGregor, A., Hall, M., Lorier, P., Brunskill, J.: Flow Clustering Using Machine Learning Techniques. In: Barakat, C., Pratt, I. (eds.) PAM 2004. LNCS, vol.\u00a03015, pp. 205\u2013214. Springer, Heidelberg (2004)"},{"key":"11_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/978-3-540-31966-5_26","volume-title":"Passive and Active Network Measurement","author":"S. Zander","year":"2005","unstructured":"Zander, S., Nguyen, T., Armitage, G.: Self-Learning IP Traffic Classification Based on Statistical Flow Characteristics. In: Dovrolis, C. (ed.) PAM 2005. LNCS, vol.\u00a03431, pp. 325\u2013328. Springer, Heidelberg (2005)"},{"doi-asserted-by":"crossref","unstructured":"Moore, A.W., Zuev, D.: Internet Traffic Classification Using Bayesian Analysis Techniques. In: ACM SIGMETRICS (2005)","key":"11_CR8","DOI":"10.1145\/1064212.1064220"},{"issue":"5","key":"11_CR9","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/1163593.1163596","volume":"36","author":"N. Williams","year":"2006","unstructured":"Williams, N., Zander, S., Armitages, G.: A Preliminary Performance Comparison of Five Machine Learning Algorithms for Practical IP Traffic Flow Classification. SIGCOMM Computer Communications Review,\u00a036(5), 5\u201316 (2006)","journal-title":"SIGCOMM Computer Communications Review,"},{"unstructured":"Lu, X., Duan, H., Li, X.: Identification of P2P traffic based on the content redistribution characteristic. In: Communications and Information Technologies, 2007. ISCIT 2007, pp. 596\u2013601 (2007)","key":"11_CR10"},{"doi-asserted-by":"crossref","unstructured":"Karagiannis, T., Broido, A., Faloutsos, M.: Transport Layer Identification of P2P Traffic IMC (2004)","key":"11_CR11","DOI":"10.1145\/1028788.1028804"},{"doi-asserted-by":"crossref","unstructured":"Karagiannis, T., Papagiannaki, K., Faloutsos, M.: BLINC: Multilevel Traffic Classification in the Dark. In: ACM SIGCOMM, Philadelphia, PA (August 2005)","key":"11_CR12","DOI":"10.1145\/1080091.1080119"},{"doi-asserted-by":"crossref","unstructured":"Hu, Y., Chiu, D.M., Lui, J.C.S.: Application Identification based on Network Behavioral Profiles. In: IEEE IWQoS (2008)","key":"11_CR13","DOI":"10.1109\/IWQOS.2008.31"},{"doi-asserted-by":"crossref","unstructured":"Muthitacharoen, A., Chen, B., Mazieres, D.: A low-bandwidth network file system. In: Proceedings ofthe 18th ACM Symposium on Operating SystemsPrinciples (SOSP 2001), Banff, Canada, pp. 174\u2013187 (2001)","key":"11_CR14","DOI":"10.1145\/502034.502052"},{"unstructured":"Kim, H., Karp, B.: Autograph: Toward automatic distributed worm signature detection. In: Proc. of the USENIX Security Symp. Diego, pp. 271\u2013286 (2004)","key":"11_CR15"},{"unstructured":"Rabin, M.O.: Fingerprinting by Random Polynomials. Tech. Rep.TR-15-81, Center for Research in Computing Technology, Harvard University (1981)","key":"11_CR16"},{"key":"11_CR17","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/978-1-4613-9323-8_11","volume-title":"Sequences II: Methods in Communications, Security, and Computer Science","author":"A.Z. Broder","year":"1993","unstructured":"Broder, A.Z.: Some applications of Rabin\u2019s fingerprinting method. In: Capocelli, R., De Santis, A., Vaccaro, U. (eds.) Sequences II: Methods in Communications, Security, and Computer Science, pp. 143\u2013152. Springer, New York (1993)"},{"key":"11_CR18","first-page":"177","volume-title":"Proceedings of the 6th ACM SIGCOMM Conference on internet Measurement, IMC 2006","author":"C. Gkantsidis","year":"2006","unstructured":"Gkantsidis, C., Miller, J., Rodriguez, P.: Comprehensive view of a live network coding P2P system. In: Proceedings of the 6th ACM SIGCOMM Conference on internet Measurement, IMC 2006, pp. 177\u2013188. ACM, New York (2006)"},{"issue":"4","key":"11_CR19","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1145\/1282427.1282386","volume":"37","author":"D. Bonfiglio","year":"2007","unstructured":"Bonfiglio, D., Mellia, M., Meo, M., Rossi, D., Tofanelli, P.: Revealing skype traffic: when randomness plays with you. SIGCOMM Comput. Commun. Rev.\u00a037(4), 37\u201348 (2007)","journal-title":"SIGCOMM Comput. Commun. Rev."},{"issue":"3","key":"11_CR20","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1145\/1273445.1273454","volume":"37","author":"L. Salgarelli","year":"2007","unstructured":"Salgarelli, L., Gringoli, F., Karagiannis, T.: Comparing traffic classifiers. SIGCOMM Comput. Commun. Rev.\u00a037(3), 65\u201368 (2007)","journal-title":"SIGCOMM Comput. Commun. Rev."}],"container-title":["Lecture Notes in Computer Science","NETWORKING 2009"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-01399-7_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T17:52:34Z","timestamp":1558288354000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-01399-7_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642013980","9783642013997"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-01399-7_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}