{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T14:57:48Z","timestamp":1773154668904,"version":"3.50.1"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2021,9,16]],"date-time":"2021-09-16T00:00:00Z","timestamp":1631750400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,9,16]],"date-time":"2021-09-16T00:00:00Z","timestamp":1631750400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100000105","name":"Office of Advanced Cyberinfrastructure","doi-asserted-by":"publisher","award":["1642158"],"award-info":[{"award-number":["1642158"]}],"id":[{"id":"10.13039\/100000105","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2022,8]]},"DOI":"10.1007\/s10586-021-03393-2","type":"journal-article","created":{"date-parts":[[2021,9,16]],"date-time":"2021-09-16T04:02:26Z","timestamp":1631764946000},"page":"2839-2853","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Practical and configurable network traffic classification using probabilistic machine learning"],"prefix":"10.1007","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9890-7978","authenticated-orcid":false,"given":"Jiahui","family":"Chen","sequence":"first","affiliation":[]},{"given":"Joe","family":"Breen","sequence":"additional","affiliation":[]},{"given":"Jeff M.","family":"Phillips","sequence":"additional","affiliation":[]},{"given":"Jacobus","family":"Van der Merwe","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,16]]},"reference":[{"key":"3393_CR1","doi-asserted-by":"publisher","unstructured":"Karmakar, K., Varadharajan, V., Tupakula, U.: Mitigating attacks in software defined networks. Clust. Comput. (2019). https:\/\/doi.org\/10.1007\/s10586-018-02900-2","DOI":"10.1007\/s10586-018-02900-2"},{"key":"3393_CR2","unstructured":"Moore, D., Keys, K., Koga, R., Lagache, E., Claffy, K.C.: The coralreef software suite as a tool for system and network administrators. In: Proceedings of the 15th USENIX Conference on System Administration, USENIX Association, USA, LISA \u201901, pp 133\u2013144 (2001)"},{"issue":"SI","key":"3393_CR3","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1145\/844128.844158","volume":"36","author":"S Saroiu","year":"2003","unstructured":"Saroiu, S., Gummadi, K.P., Dunn, R.J., Gribble, S.D., Levy, H.M.: An analysis of internet content delivery systems. SIGOPS Oper. Syst. Rev. 36(SI), 315\u2013327 (2003) https:\/\/doi.org\/10.1145\/844128.844158","journal-title":"SIGOPS Oper Syst Rev"},{"issue":"2","key":"3393_CR4","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1109\/TNET.2004.826277","volume":"12","author":"S Sen","year":"2004","unstructured":"Sen, S., Wang, Jia: Analyzing peer-to-peer traffic across large networks. IEEE\/ACM Trans. Netw. 12(2), 219\u2013232 (2004)","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"3393_CR5","doi-asserted-by":"publisher","unstructured":"Erman, J., Arlitt, M., Mahanti, A.: Traffic classification using clustering algorithms. In: Proceedings of the 2006 SIGCOMM Workshop on Mining Network Data, ACM, New York, NY, USA, MineNet \u201906, pp 281\u2013286 (2006) https:\/\/doi.org\/10.1145\/1162678.1162679","DOI":"10.1145\/1162678.1162679"},{"key":"3393_CR6","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/978-3-540-31966-5_4","volume-title":"Passive and Active Network Measurement","author":"AW Moore","year":"2005","unstructured":"Moore, A.W., Papagiannaki, K.: Toward the accurate identification of network applications. In: Dovrolis, C. (ed.) Passive and Active Network Measurement, pp. 41\u201354. Springer, Berlin (2005)"},{"issue":"4","key":"3393_CR7","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/SURV.2008.080406","volume":"10","author":"TTT Nguyen","year":"2008","unstructured":"Nguyen, T.T.T., Armitage, G.: A survey of techniques for internet traffic classification using machine learning. IEEE Commun. Surv. Tutor. 10(4), 56\u201376 (2008). https:\/\/doi.org\/10.1109\/SURV.2008.080406","journal-title":"IEEE Communications Surveys Tutorials"},{"key":"3393_CR8","doi-asserted-by":"publisher","unstructured":"Haffner, P., Sen, S., Spatscheck, O., Wang, D.: Acas: Automated construction of application signatures. In: Proceedings of the 2005 ACM SIGCOMM Workshop on Mining Network Data, Association for Computing Machinery, New York, NY, USA, MineNet \u201905, p 197\u2013202 (2005). https:\/\/doi.org\/10.1145\/1080173.1080183","DOI":"10.1145\/1080173.1080183"},{"key":"3393_CR9","doi-asserted-by":"publisher","unstructured":"Karagiannis, T., Papagiannaki, K., Faloutsos, M.: Blinc: Multilevel traffic classification in the dark. In: Proceedings of the 2005 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Association for Computing Machinery, New York, NY, USA, SIGCOMM \u201905, pp 229\u2013240 (2005). https:\/\/doi.org\/10.1145\/1080091.1080119","DOI":"10.1145\/1080091.1080119"},{"key":"3393_CR10","doi-asserted-by":"publisher","unstructured":"Sen, S., Spatscheck, O., Wang, D.: Accurate, scalable in-network identification of p2p traffic using application signatures. In: Proceedings of the 13th International Conference on World Wide Web, Association for Computing Machinery, New York, NY, USA, WWW \u201904, pp 512\u2013521 (2004). https:\/\/doi.org\/10.1145\/988672.988742","DOI":"10.1145\/988672.988742"},{"key":"3393_CR11","doi-asserted-by":"publisher","unstructured":"Wang, Y., Liang, Y., Sun, H., Ma, Y.: Intrusion detection and performance simulation based on improved sequential pattern mining algorithm. Clust. Comput. (2020). https:\/\/doi.org\/10.1007\/s10586-020-03129-8","DOI":"10.1007\/s10586-020-03129-8"},{"key":"3393_CR12","unstructured":"ESnet: Science-DMZ (2020). http:\/\/fasterdata.es.net\/science-dmz\/. Accessed April 2020"},{"key":"3393_CR13","doi-asserted-by":"publisher","unstructured":"Lan, K.C., Heidemann, J.: A measurement study of correlations of internet flow characteristics. Comput. Netw. 50 (1):46\u201362 (2006). https:\/\/doi.org\/10.1016\/j.comnet.2005.02.008","DOI":"10.1016\/j.comnet.2005.02.008"},{"key":"3393_CR14","doi-asserted-by":"publisher","unstructured":"Kim, H., Claffy, K., Fomenkov, M., Barman, D., Faloutsos, M., Lee, K.: Internet traffic classification demystified: myths, caveats, and the best practices. In: Proceedings of the 2008 ACM CoNEXT Conference, ACM, New York, NY, USA, CoNEXT \u201908, vol. 7, pp 1\u201312 (2008). https:\/\/doi.org\/10.1145\/1544012.1544023","DOI":"10.1145\/1544012.1544023"},{"key":"3393_CR15","unstructured":"Rezaei, S., Liu, X.: Deep learning for encrypted traffic classification: an overview (2018). CoRR.  arXiv:1810.07906"},{"key":"3393_CR16","doi-asserted-by":"publisher","unstructured":"t\u00a0Nguyen, T. T., Armitage, G.: Training on multiple sub-flows to optimise the use of machine learning classifiers in real-world ip networks. In: Proceedings. 2006 31st IEEE Conference on Local Computer Networks, pp 369\u2013376 (2006). https:\/\/doi.org\/10.1109\/LCN.2006.322122","DOI":"10.1109\/LCN.2006.322122"},{"key":"3393_CR17","doi-asserted-by":"publisher","first-page":"1880","DOI":"10.1109\/TNET.2012.2187305","volume":"20","author":"TTT Nguyen","year":"2012","unstructured":"Nguyen, T.T.T., Armitage, G.J., Branch, P., Zander, S.: Timely and continuous machine-learning-based classification for interactive ip traffic. IEEE\/ACM Trans. Netw. 20, 1880\u20131894 (2012)","journal-title":"IEEE\/ACM Transactions on Networking"},{"issue":"12","key":"3393_CR18","doi-asserted-by":"publisher","first-page":"1457","DOI":"10.1016\/j.comcom.2012.04.012","volume":"35","author":"H Zhang","year":"2012","unstructured":"Zhang, H., Lu, G., Qassrawi, M.T., Zhang, Y., Yu, X.: Feature selection for optimizing traffic classification. Comput. Commun. 35(12), 1457\u20131471 (2012). https:\/\/doi.org\/10.1016\/j.comcom.2012.04.012","journal-title":"Comput Commun"},{"key":"3393_CR19","doi-asserted-by":"crossref","unstructured":"Lopez-Martin, M., Carro, B., Sanchez-Esguevillas, A., Lloret, J.: Network traffic classifier with convolutional and recurrent neural networks for internet of things. IEEE Access     5, 18,042\u201318,050 (2017)","DOI":"10.1109\/ACCESS.2017.2747560"},{"key":"3393_CR20","doi-asserted-by":"crossref","unstructured":"Nguyen, T.T.T., Armitage, G.: Clustering to assist supervised machine learning for real-time ip traffic classification. In: 2008 IEEE International Conference on Communications, pp 5857\u20135862. IEEE, Beijing, China (2008)","DOI":"10.1109\/ICC.2008.1095"},{"key":"3393_CR21","doi-asserted-by":"publisher","unstructured":"Moore, A.W., Zuev, D.: Internet traffic classification using bayesian analysis techniques. In: Proceedings of the 2005 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, Association for Computing Machinery, New York, NY, USA, SIGMETRICS \u201905, pp 50\u201360 (2005). https:\/\/doi.org\/10.1145\/1064212.1064220","DOI":"10.1145\/1064212.1064220"},{"key":"3393_CR22","doi-asserted-by":"crossref","unstructured":"Shafiq, M., Yu, X., Laghari, A. A., Yao, L., Karn, N. K., Abdessamia, F.: Network traffic classification techniques and comparative analysis using machine learning algorithms. In: 2016 2nd IEEE International Conference on Computer and Communications (ICCC), pp 2451\u20132455. IEEE, Chengdu, China (2016)","DOI":"10.1109\/CompComm.2016.7925139"},{"key":"3393_CR23","unstructured":"Casas, P., Mazel, J., Owezarski, P.: Minetrac: Mining flows for unsupervised analysis semi-supervised classification. In: 2011 23rd International Teletraffic Congress (ITC), pp 87\u201394. International Teletraffic Congress, San Francisco, California (2011)"},{"key":"3393_CR24","doi-asserted-by":"publisher","first-page":"1194","DOI":"10.1016\/j.peva.2007.06.014","volume":"64","author":"J Erman","year":"2007","unstructured":"Erman, J., Mahanti, A., Arlitt, M., Cohen, I., Williamson, C.: Offline\/realtime traffic classification using semi-supervised learning. Perform. Eval. 64, 1194\u20131213 (2007). https:\/\/doi.org\/10.1016\/j.peva.2007.06.014","journal-title":"Performance Evaluation"},{"issue":"1","key":"3393_CR25","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1145\/1269899.1254934","volume":"35","author":"J Erman","year":"2007","unstructured":"Erman, J., Mahanti, A., Arlitt, M., Cohen, I., Williamson, C.: Semi-supervised network traffic classification. SIGMETRICS Perform. Eval. Rev. 35(1), 369\u2013370 (2007). https:\/\/doi.org\/10.1145\/1269899.1254934","journal-title":"SIGMETRICS Perform Eval Rev"},{"issue":"2","key":"3393_CR26","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1007\/s10586-018-2835-2","volume":"22","author":"R Sun","year":"2019","unstructured":"Sun, R., Zhang, S., Yin, C., Wang, J., Min, S.: Strategies for data stream mining method applied in anomaly detection. Clust. Comput. 22(2), 399\u2013408 (2019). https:\/\/doi.org\/10.1007\/s10586-018-2835-2","journal-title":"Cluster Computing"},{"issue":"4","key":"3393_CR27","doi-asserted-by":"publisher","first-page":"1257","DOI":"10.1109\/TNET.2014.2320577","volume":"23","author":"J Zhang","year":"2015","unstructured":"Zhang, J., Chen, X., Xiang, Y., Zhou, W., Wu, J.: Robust network traffic classification. IEEE\/ACM Trans. Netw. 23(4), 1257\u20131270 (2015)","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"3393_CR28","unstructured":"Baker, R., Quinn, R., Phillips, J., Van\u00a0der Merwe, J.: Toward classifying unknown application traffic. In: Proceedings. DYnamic and Novel Advances in Machine Learning and Intelligent Cyber Security DYNAMICS\u201918. ACSAC, San Juan, Puerto Rico (2018)"},{"key":"3393_CR29","first-page":"1189","volume":"29","author":"JH Friedman","year":"2000","unstructured":"Friedman, J.H.: Greedy function approximation: A gradient boosting machine. Ann. Stat. 29, 1189\u20131232 (2000)","journal-title":"Annals of Statistics"},{"key":"3393_CR30","doi-asserted-by":"crossref","unstructured":"Winter, P., Hermann, E., Zeilinger, M.: Inductive intrusion detection in flow-based network data using one-class support vector machines. In: NTMS, IEEE, pp 1\u20135, (2011) http:\/\/dblp.uni-trier.de\/db\/conf\/ntms\/ntms2011.html#WinterHZ11. Accessed Feb 2020","DOI":"10.1109\/NTMS.2011.5720582"},{"issue":"2","key":"3393_CR31","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1145\/2076450.2076468","volume":"55","author":"B Allen","year":"2012","unstructured":"Allen, B., Bresnahan, J., Childers, L., Foster, I., Kandaswamy, G., Kettimuthu, R., Kordas, J., Link, M., Martin, S., Pickett, K., Tuecke, S.: Software as a service for data scientists. Commun. ACM 55(2), 81\u201388 (2012). https:\/\/doi.org\/10.1145\/2076450.2076468","journal-title":"Commun ACM"},{"issue":"3","key":"3393_CR32","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/MIC.2011.64","volume":"15","author":"I Foster","year":"2011","unstructured":"Foster, I.: Globus online: accelerating and democratizing science through cloud-based services. IEEE Internet Comput. 15(3), 70\u201373 (2011)","journal-title":"IEEE Internet Computing"},{"key":"3393_CR33","unstructured":"Exchange IT: the fast data transfer tool: overcoming limitations to high performance transfers over the wide area network. Tutorial (2017). https:\/\/indico.hep.caltech.edu\/event\/174\/. Accessed April 2020"},{"key":"3393_CR34","unstructured":"Craig-Wood, N.: Rclone. (2020). https:\/\/rclone.org\/. Accessed April 2020"},{"key":"3393_CR35","unstructured":"ESnet: science DMZ: data transfer nodes (2020). https:\/\/fasterdata.es.net\/science-dmz\/DTN\/. Accessed April 2020"},{"key":"3393_CR36","unstructured":"ESnet: ESnet data transfer nodes (2020). https:\/\/fasterdata.es.net\/performance-testing\/DTNs\/. Accessed April 2020"},{"key":"3393_CR37","unstructured":"Cho, K., Mitsuya, K., Kato, A.: Traffic data repository at the wide project. In: USENIX 2000 FREENIX Track, USENIX. Accessed Nov 2019 (2000)"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-021-03393-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-021-03393-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-021-03393-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,14]],"date-time":"2022-07-14T11:25:41Z","timestamp":1657797941000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-021-03393-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,16]]},"references-count":37,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,8]]}},"alternative-id":["3393"],"URL":"https:\/\/doi.org\/10.1007\/s10586-021-03393-2","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,9,16]]},"assertion":[{"value":"5 May 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 July 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 August 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 September 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed Consent"}}]}}