{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T15:55:07Z","timestamp":1762271707183},"publisher-location":"Berlin, Heidelberg","reference-count":68,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642367830"},{"type":"electronic","value":"9783642367847"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-36784-7_6","type":"book-chapter","created":{"date-parts":[[2013,3,1]],"date-time":"2013-03-01T19:04:20Z","timestamp":1362164660000},"page":"123-147","source":"Crossref","is-referenced-by-count":72,"title":["Reviewing Traffic Classification"],"prefix":"10.1007","author":[{"given":"Silvio","family":"Valenti","sequence":"first","affiliation":[]},{"given":"Dario","family":"Rossi","sequence":"additional","affiliation":[]},{"given":"Alberto","family":"Dainotti","sequence":"additional","affiliation":[]},{"given":"Antonio","family":"Pescap\u00e8","sequence":"additional","affiliation":[]},{"given":"Alessandro","family":"Finamore","sequence":"additional","affiliation":[]},{"given":"Marco","family":"Mellia","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","unstructured":"CAIDA, The Cooperative Association for Internet Data Analysis, \n                    \n                      http:\/\/www.caida.org\/research\/traffic-analysis\/classification-overview\/"},{"key":"6_CR2","unstructured":"IANA, List of assigned port numbers, \n                    \n                      http:\/\/www.iana.org\/assignments\/port-numbers"},{"key":"6_CR3","unstructured":"l7filter, Application layer packet classifier for Linux, \n                    \n                      http:\/\/l7-filter.clearfoundation.com\/"},{"key":"6_CR4","unstructured":"Tstat, \n                    \n                      http:\/\/tstat.tlc.polito.it"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Aceto, G., Dainotti, A., de Donato, W., Pescap\u00e8, A.: Portload: Taking the best of two worlds in traffic classification. In: INFOCOM IEEE Conference on Computer Communications Workshops, 15, pp. 1\u20135 (2010)","DOI":"10.1109\/INFCOMW.2010.5466645"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Bakerand, F., Fosterand, B., Sharp, C.: Cisco Architecture for Lawful Intercept in IP Networks. IETF RFC 3924 (Informational) (October 2004)","DOI":"10.17487\/rfc3924"},{"issue":"6","key":"6_CR7","doi-asserted-by":"publisher","first-page":"1394","DOI":"10.1016\/j.comnet.2010.12.004","volume":"55","author":"P. Bermolen","year":"2011","unstructured":"Bermolen, P., Mellia, M., Meo, M., Rossi, D., Valenti, S.: Abacus: Accurate behavioral classification of P2P-TV traffic. Elsevier Computer Networks\u00a055(6), 1394\u20131411 (2011)","journal-title":"Elsevier Computer Networks"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Bernaille, L., Teixeira, R., Salamatian, K.: Early application identification. In: Proc. of ACM CoNEXT 2006, Lisboa, PT (December 2006)","DOI":"10.1145\/1368436.1368445"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Carela-Espaoll, V., Barlet-Ros, P., Sole-Simo, M., Dainotti, A., de Donato, W., Pescap\u00e8, A.: K-dimensional trees for continuous traffic classification, pp. 141\u2013154 (2010)","DOI":"10.1007\/978-3-642-12365-8_11"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Cascarano, N., Risso, F., Este, A., Gringoli, F., Salgarelli, L., Finamore, A., Mellia, M.: Comparing P2PTV Traffic Classifiers. In: 2010 IEEE International Conference on Communications (ICC), pp. 1\u20136 (May 2010)","DOI":"10.1109\/ICC.2010.5501744"},{"issue":"5","key":"6_CR11","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1145\/1880153.1880157","volume":"40","author":"N. Cascarano","year":"2010","unstructured":"Cascarano, N., Rolando, P., Risso, F., Sisto, R.: Infant: Nfa pattern matching on gpgpu devices. Computer Communication Review\u00a040(5), 20\u201326 (2010)","journal-title":"Computer Communication Review"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Claise, B.: Cisco Systems NetFlow Services Export Version 9. RFC 3954 (Informational) (October 2004)","DOI":"10.17487\/rfc3954"},{"key":"6_CR13","first-page":"273","volume":"20","author":"C. Cortes","year":"1995","unstructured":"Cortes, C., Vapnik, V.: Support-vector networks. Machine Learning\u00a020, 273\u2013297 (1995)","journal-title":"Machine Learning"},{"key":"6_CR14","volume-title":"An introduction to Support Vector Machines and Other Kernel-based Learning Methods","author":"N. Cristianini","year":"1999","unstructured":"Cristianini, N., Shawe-Taylor, J.: An introduction to Support Vector Machines and Other Kernel-based Learning Methods. Cambridge University Press, New York (1999)"},{"issue":"1","key":"6_CR15","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/1198255.1198257","volume":"37","author":"M. Crotti","year":"2007","unstructured":"Crotti, M., Dusi, M., Gringoli, F., Salgarelli, L.: Traffic classification through simple statistical fingerprinting. ACM SIGCOMM Computer Communication Review\u00a037(1), 5\u201316 (2007)","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"6_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1007\/978-3-642-01645-5_8","volume-title":"Traffic Monitoring and Analysis","author":"A. Dainotti","year":"2009","unstructured":"Dainotti, A., de Donato, W., Pescap\u00e9, A.: TIE: A Community-Oriented Traffic Classification Platform. In: Papadopouli, M., Owezarski, P., Pras, A. (eds.) TMA 2009. LNCS, vol.\u00a05537, pp. 64\u201374. Springer, Heidelberg (2009)"},{"key":"6_CR17","unstructured":"Dainotti, A., de Donato, W., Pescap\u00e8, A., Salvo Rossi, P.: Classification of network traffic via packet-level hidden markov models 30, 1\u20135 (2008)"},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"Dainotti, A., Pescap\u00e8, A., Kim, H.C.: Traffic classification through joint distributions of packet-level statistics. In: GLOBECOM, pp. 1\u20136 (2011)","DOI":"10.1109\/GLOCOM.2011.6134093"},{"issue":"1","key":"6_CR19","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/MNET.2012.6135854","volume":"26","author":"A. Dainotti","year":"2012","unstructured":"Dainotti, A., Pescap\u00e9, A., Claffy, K.C.: Issues and future directions in traffic classification. IEEE Network\u00a026(1), 35\u201340 (2012)","journal-title":"IEEE Network"},{"key":"6_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1007\/978-3-642-20305-3_11","volume-title":"Traffic Monitoring and Analysis","author":"A. Dainotti","year":"2011","unstructured":"Dainotti, A., Pescap\u00e9, A., Sansone, C.: Early Classification of Network Traffic through Multi-classification. In: Domingo-Pascual, J., Shavitt, Y., Uhlig, S. (eds.) TMA 2011. LNCS, vol.\u00a06613, pp. 122\u2013135. Springer, Heidelberg (2011)"},{"key":"6_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1007\/978-3-642-21557-5_38","volume-title":"Multiple Classifier Systems","author":"A. Dainotti","year":"2011","unstructured":"Dainotti, A., Pescap\u00e9, A., Sansone, C., Quintavalle, A.: Using a Behaviour Knowledge Space Approach for Detecting Unknown IP Traffic Flows. In: Sansone, C., Kittler, J., Roli, F. (eds.) MCS 2011. LNCS, vol.\u00a06713, pp. 360\u2013369. Springer, Heidelberg (2011)"},{"key":"6_CR22","doi-asserted-by":"crossref","unstructured":"Santiago del R\u00edo, P.M., Rossi, D., Gringoli, F., Nava, L., Salgarelli, L., Aracil, J.: Wire-speed statistical classification of network traffic on commodity hardware. In: ACM IMC 2012 (2012)","DOI":"10.1145\/2398776.2398784"},{"key":"6_CR23","doi-asserted-by":"crossref","unstructured":"Erman, J., Arlitt, M., Mahanti, A.: Traffic classification using clustering algorithms. In: MineNet 2006: Mining Network Data (MineNet) Workshop at ACM SIGCOMM 2006, Pisa, Italy (2006)","DOI":"10.1145\/1162678.1162679"},{"key":"6_CR24","doi-asserted-by":"crossref","unstructured":"Erman, J., Mahanti, A., Arlitt, M., Williamson, C.: Identifying and discriminating between web and peer-to-peer traffic in the network core. In: Proceedings of the 16th International Conference on World Wide Web, WWW 2007, Banff, Alberta, Canada, pp. 883\u2013892 (2007)","DOI":"10.1145\/1242572.1242692"},{"key":"6_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/978-3-642-01645-5_14","volume-title":"Traffic Monitoring and Analysis","author":"A. Finamore","year":"2009","unstructured":"Finamore, A., Mellia, M., Meo, M., Rossi, D.: KISS: Stochastic Packet Inspection. In: Papadopouli, M., Owezarski, P., Pras, A. (eds.) TMA 2009. LNCS, vol.\u00a05537, pp. 117\u2013125. Springer, Heidelberg (2009)"},{"issue":"5","key":"6_CR26","doi-asserted-by":"publisher","first-page":"1505","DOI":"10.1109\/TNET.2010.2044046","volume":"18","author":"A. Finamore","year":"2010","unstructured":"Finamore, A., Mellia, M., Meo, M., Rossi, D.: Kiss: Stochastic packet inspection classifier for udp traffic. IEEE\/ACM Transaction on Networking\u00a018(5), 1505\u20131515 (2010)","journal-title":"IEEE\/ACM Transaction on Networking"},{"key":"6_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/978-3-642-12365-8_9","volume-title":"Traffic Monitoring and Analysis","author":"A. Finamore","year":"2010","unstructured":"Finamore, A., Meo, M., Rossi, D., Valenti, S.: Kiss to Abacus: A Comparison of P2P-TV Traffic Classifiers. In: Ricciato, F., Mellia, M., Biersack, E. (eds.) TMA 2010. LNCS, vol.\u00a06003, pp. 115\u2013126. Springer, Heidelberg (2010)"},{"key":"6_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1007\/978-3-642-00975-4_16","volume-title":"Passive and Active Network Measurement","author":"T.Z.J. Fu","year":"2009","unstructured":"Fu, T.Z.J., Hu, Y., Shi, X., Chiu, D.M., Lui, J.C.S.: PBS: Periodic Behavioral Spectrum of P2P Applications. In: Moon, S.B., Teixeira, R., Uhlig, S. (eds.) PAM 2009. LNCS, vol.\u00a05448, pp. 155\u2013164. Springer, Heidelberg (2009)"},{"issue":"5","key":"6_CR29","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1145\/1629607.1629610","volume":"39","author":"F. Gringoli","year":"2009","unstructured":"Gringoli, F., Salgarelli, L., Dusi, M., Cascarano, N., Risso, F., Claffy, K.C.: GT: picking up the truth from the ground for internet traffic. ACM SIGCOMM Comput. Commun. Rev.\u00a039(5), 12\u201318 (2009)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"6_CR30","doi-asserted-by":"crossref","unstructured":"Haffner, P., Sen, S., Spatscheck, O., Wang, D.: ACAS: automated construction of application signatures. In: ACM SIGCOMM Workshop on Mining Network Data (Minenet 2005), Philadelphia, PA (August 2005)","DOI":"10.1145\/1080173.1080183"},{"key":"6_CR31","doi-asserted-by":"crossref","unstructured":"Iliofotou, M., Pappu, P., Faloutsos, M., Mitzenmacher, M., Singh, S., Varghese, G.: Network monitoring using traffic dispersion graphs (tdgs). In: Proc. of IMC 2007, San Diego, California, USA (2007)","DOI":"10.1145\/1298306.1298349"},{"key":"6_CR32","doi-asserted-by":"crossref","unstructured":"Jamshed, M., Lee, J., Moon, S., Yun, I., Kim, D., Lee, S., Yi, Y., Park, K.S.: Kargus: a highly-scalable software-based intrusion detection system (2012)","DOI":"10.1145\/2382196.2382232"},{"key":"6_CR33","doi-asserted-by":"crossref","unstructured":"Jin, Y., Duffield, N., Haffner, P., Sen, S., Zhang, Z.-L.: Inferring applications at the network layer using collective traffic statistics. SIGMETRICS Perform. Eval. Rev.\u00a038 (June 2010)","DOI":"10.1145\/1811099.1811082"},{"key":"6_CR34","unstructured":"Karagiannis, T., Broido, A., Brownlee, N., Klaffy, K.C., Faloutsos, M.: Is P2P dying or just hiding? In: IEEE GLOBECOM 2004, Dallas, Texas, US (2004)"},{"key":"6_CR35","doi-asserted-by":"crossref","unstructured":"Karagiannis, T., Broido, A., Faloutsos, M., Claffy, K.C.: Transport layer identification of P2P traffic. In: 4th ACM SIGCOMM Internet Measurement Conference (IMC 2004), Taormina, IT (October 2004)","DOI":"10.1145\/1028788.1028804"},{"key":"6_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1007\/978-3-540-71617-4_19","volume-title":"Passive and Active Network Measurement","author":"T. Karagiannis","year":"2007","unstructured":"Karagiannis, T., Papagiannaki, K., Taft, N., Faloutsos, M.: Profiling the End Host. In: Uhlig, S., Papagiannaki, K., Bonaventure, O. (eds.) PAM 2007. LNCS, vol.\u00a04427, pp. 186\u2013196. Springer, Heidelberg (2007)"},{"key":"6_CR37","doi-asserted-by":"crossref","unstructured":"Khakpour, A.R., Liu, A.X.: High-speed flow nature identification. In: Proceedings of the 2009 29th IEEE International Conference on Distributed Computing Systems, ICDCS (2009)","DOI":"10.1109\/ICDCS.2009.34"},{"key":"6_CR38","doi-asserted-by":"crossref","unstructured":"Kim, H., Claffy, K., Fomenkov, M., Barman, D., Faloutsos, M., Lee, K.: Internet traffic classification demystified: myths, caveats, and the best practices. In: Proc. of ACM CoNEXT 2008, Madrid, Spain (2008)","DOI":"10.1145\/1544012.1544023"},{"key":"6_CR39","unstructured":"Kohavi, R., Quinlan, R.: Decision tree discovery. In: Handbook of Data Mining and Knowledge Discovery, pp. 267\u2013276. University Press (1999)"},{"key":"6_CR40","first-page":"3","volume-title":"Proceeding of the 2007 conference on Emerging Artificial Intelligence Applications in Computer Engineering: Real Word AI Systems with Applications in eHealth, HCI, Information Retrieval and Pervasive Technologies","author":"S.B. Kotsiantis","year":"2007","unstructured":"Kotsiantis, S.B.: Supervised machine learning: A review of classification techniques. In: Proceeding of the 2007 conference on Emerging Artificial Intelligence Applications in Computer Engineering: Real Word AI Systems with Applications in eHealth, HCI, Information Retrieval and Pervasive Technologies, pp. 3\u201324. IOS Press, Amsterdam (2007)"},{"key":"6_CR41","doi-asserted-by":"crossref","unstructured":"Kumar, S., Crowley, P.: Algorithms to accelerate multiple regular expressions matching for deep packet inspection. In: Proceedings of the Annual Conference of the ACM Special Interest Group on Data Communication (SIGCOMM 2006), pp. 339\u2013350 (2006)","DOI":"10.1145\/1151659.1159952"},{"issue":"6","key":"6_CR42","doi-asserted-by":"publisher","first-page":"790","DOI":"10.1016\/j.comnet.2008.11.016","volume":"53","author":"W. Li","year":"2009","unstructured":"Li, W., Canini, M., Moore, A.W., Bolla, R.: Efficient application identification and the temporal and spatial stability of classification schema. Computer Networks\u00a053(6), 790\u2013809 (2009)","journal-title":"Computer Networks"},{"key":"6_CR43","doi-asserted-by":"crossref","unstructured":"Liu, Y., Xu, D., Sun, L., Liu, D.: Accurate traffic classification with multi-threaded processors. In: IEEE International Symposium on Knowledge Acquisition and Modeling Workshop, KAM (2008)","DOI":"10.1109\/KAMW.2008.4810528"},{"key":"6_CR44","doi-asserted-by":"crossref","unstructured":"Ma, J., Levchenko, K., Kreibich, C., Savage, S., Voelker, G.M.: Unexpected means of protocol inference. In: 6th ACM SIGCOMM Internet Measurement Conference (IMC 2006), Rio de Janeiro, BR (October 2006)","DOI":"10.1145\/1177080.1177123"},{"key":"6_CR45","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/978-3-540-24668-8_21","volume-title":"Passive and Active Network Measurement","author":"A. McGregor","year":"2004","unstructured":"McGregor, A., Hall, M., Lorier, P., Brunskill, J.: Flow Clustering Using Machine Learning Techniques. In: Barakat, C., Pratt, I. (eds.) PAM 2004. LNCS, vol.\u00a03015, pp. 205\u2013214. Springer, Heidelberg (2004)"},{"issue":"6","key":"6_CR46","doi-asserted-by":"publisher","first-page":"759","DOI":"10.1016\/j.comnet.2008.12.007","volume":"53","author":"M. Mellia","year":"2009","unstructured":"Mellia, M., Pescap\u00e8, A., Salgarelli, L.: Traffic classification and its applications to modern networks. Computer Networks\u00a053(6), 759\u2013760 (2009)","journal-title":"Computer Networks"},{"key":"6_CR47","unstructured":"Moore, A., Zuev, D., Crogan, M.: Discriminators for use in flow-based classification. Technical report, University of Cambridge (2005)"},{"key":"6_CR48","doi-asserted-by":"crossref","unstructured":"Moore, A.W., Zuev, D.: Internet traffic classification using bayesian analysis techniques. In: ACM SIGMETRICS 2005, Banff, Alberta, Canada (2005)","DOI":"10.1145\/1064212.1064220"},{"key":"6_CR49","unstructured":"Moore, D., Keys, K., Koga, R., Lagache, E., Claffy, K.C.: The coralreef software suite as a tool for system and network administrators. In: Proceedings of the 15th USENIX Conference on System Administration, San Diego, California (2001)"},{"key":"6_CR50","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/978-3-540-31966-5_4","volume-title":"Passive and Active Network Measurement","author":"A.W. Moore","year":"2005","unstructured":"Moore, A.W., Papagiannaki, K.: Toward the Accurate Identification of Network Applications. In: Dovrolis, C. (ed.) PAM 2005. LNCS, vol.\u00a03431, pp. 41\u201354. Springer, Heidelberg (2005)"},{"key":"6_CR51","unstructured":"Napa-Wine, \n                    \n                      http:\/\/www.napa-wine.eu\/"},{"issue":"4","key":"6_CR52","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/SURV.2008.080406","volume":"10","author":"T.T.T. Nguyen","year":"2008","unstructured":"Nguyen, T.T.T., Armitage, G.: A survey of techniques for internet traffic classification using machine learning. IEEE Communications Surveys & Tutorials\u00a010(4), 56\u201376 (2008)","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"6_CR53","doi-asserted-by":"publisher","first-page":"2435","DOI":"10.1016\/S1389-1286(99)00112-7","volume":"31","author":"V. Paxson","year":"1999","unstructured":"Paxson, V.: Bro: a system for detecting network intruders in real-time. Elsevier Comput. Netw.\u00a031, 2435\u20132463 (1999)","journal-title":"Elsevier Comput. Netw."},{"key":"6_CR54","doi-asserted-by":"crossref","unstructured":"Risso, F., Baldi, M., Morandi, O., Baldini, A., Monclus, P.: Lightweight, payload-based traffic classification: An experimental evaluation. In: Proc. of IEEE ICC 2008 (May 2008)","DOI":"10.1109\/ICC.2008.1097"},{"key":"6_CR55","unstructured":"Risso, F., Cascarano, N.: Diffinder, \n                    \n                      http:\/\/netgroup.polito.it\/research-projects\/l7-traffic-classification"},{"key":"6_CR56","unstructured":"Roesch, M.: Snort - lightweight intrusion detection for networks. In: Proceedings of the 13th USENIX Conference on System Administration, LISA 1999, pp. 229\u2013238. USENIX Association (1999)"},{"key":"6_CR57","doi-asserted-by":"crossref","unstructured":"Rossi, D., Valenti, S.: Fine-grained traffic classification with Netflow data. In: TRaffic Analysis and Classification (TRAC) Workshop at IWCMC 2010, Caen, France (June 2010)","DOI":"10.1145\/1815396.1815507"},{"key":"6_CR58","doi-asserted-by":"crossref","unstructured":"Roughan, M., Sen, S., Spatscheck, O., Duffield, N.: Class-of-service mapping for QoS: a statistical signature-based approach to IP traffic classification. In: ACM SIGCOMM Internet Measurement Conference (IMC 2004), Taormina, IT (October 2004)","DOI":"10.1145\/1028788.1028805"},{"issue":"3","key":"6_CR59","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1145\/1273445.1273454","volume":"37","author":"L. Salgarelli","year":"2007","unstructured":"Salgarelli, L., Gringoli, F., Karagiannis, T.: Comparing traffic classifiers. ACM SIGCOMM Comp. Comm. Rev.\u00a037(3), 65\u201368 (2007)","journal-title":"ACM SIGCOMM Comp. Comm. Rev."},{"key":"6_CR60","doi-asserted-by":"crossref","unstructured":"Sen, S., Spatscheck, O., Wang, D.: Accurate, scalable in-network identification of p2p traffic using application signatures. In: 13th International Conference on World Wide Web (WWW 2004), New York, NY, US (May 2004)","DOI":"10.1145\/988672.988742"},{"key":"6_CR61","doi-asserted-by":"crossref","unstructured":"Lim, Y.S., Kim, H., Jeong, J., Kim, C.K., Kwon, T.T., Choi, Y.: Internet traffic classification demystified: on the sources of the discriminative power. In: CoNEXT, p. 9 (2010)","DOI":"10.1145\/1921168.1921180"},{"key":"6_CR62","doi-asserted-by":"crossref","unstructured":"Szab\u00f3, G., G\u00f3dor, I., Veres, A., Malomsoky, S., Moln\u00e1r, S.: Traffic classification over Gbit speed with commodity hardware. IEEE J. Communications Software and Systems\u00a05 (2010)","DOI":"10.24138\/jcomss.v5i3.203"},{"key":"6_CR63","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/978-3-642-01645-5_10","volume-title":"Traffic Monitoring and Analysis","author":"S. Valenti","year":"2009","unstructured":"Valenti, S., Rossi, D., Meo, M., Mellia, M., Bermolen, P.: Accurate, Fine-Grained Classification of P2P-TV Applications by Simply Counting Packets. In: Papadopouli, M., Owezarski, P., Pras, A. (eds.) TMA 2009. LNCS, vol.\u00a05537, pp. 84\u201392. Springer, Heidelberg (2009)"},{"key":"6_CR64","doi-asserted-by":"crossref","unstructured":"Vasiliadis, G., Polychronakis, M., Ioannidis, S.: Midea: a multi-parallel intrusion detection architecture. In: ACM Conference on Computer and Communications Security, pp. 297\u2013308 (2011)","DOI":"10.1145\/2046707.2046741"},{"issue":"5","key":"6_CR65","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/1163593.1163596","volume":"36","author":"N. Williams","year":"2006","unstructured":"Williams, N., Zander, S., Armitage, G.: A preliminary performance comparison of five machine learning algorithms for practical IP traffic flow classification. ACM SIGCOMM CCR\u00a036(5), 5\u201316 (2006)","journal-title":"ACM SIGCOMM CCR"},{"key":"6_CR66","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1145\/216585.216588","volume":"23","author":"W.A. Wulf","year":"1995","unstructured":"Wulf, W.A., Mckee, S.A.: Hitting the memory wall: Implications of the obvious. Computer Architecture News\u00a023, 20\u201324 (1995)","journal-title":"Computer Architecture News"},{"issue":"4","key":"6_CR67","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1145\/1090191.1080112","volume":"35","author":"K. Xu","year":"2005","unstructured":"Xu, K., Zhang, Z.-L., Bhattacharyya, S.: Profiling internet backbone traffic: behavior models and applications. ACM SIGCOMM Comput. Commun. Rev.\u00a035(4), 169\u2013180 (2005)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"6_CR68","doi-asserted-by":"crossref","unstructured":"Zu, Y., Yang, M., Xu, Z., Wang, L., Tian, X., Peng, K., Dong, Q.: Gpu-based nfa implementation for memory efficient high speed regular expression matching. In: PPOPP, pp. 129\u2013140 (2012)","DOI":"10.1145\/2370036.2145833"}],"container-title":["Lecture Notes in Computer Science","Data Traffic Monitoring and Analysis"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-36784-7_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,11]],"date-time":"2019-05-11T09:32:58Z","timestamp":1557567178000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-36784-7_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642367830","9783642367847"],"references-count":68,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-36784-7_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}