{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:00:30Z","timestamp":1761580830598},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2010,10,21]],"date-time":"2010-10-21T00:00:00Z","timestamp":1287619200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Netw Syst Manage"],"published-print":{"date-parts":[[2011,3]]},"DOI":"10.1007\/s10922-010-9181-x","type":"journal-article","created":{"date-parts":[[2010,10,20]],"date-time":"2010-10-20T11:57:50Z","timestamp":1287575870000},"page":"7-31","source":"Crossref","is-referenced-by-count":28,"title":["Optimizing Deep Packet Inspection for High-Speed Traffic Analysis"],"prefix":"10.1007","volume":"19","author":[{"given":"Niccol\u00f2","family":"Cascarano","sequence":"first","affiliation":[]},{"given":"Luigi","family":"Ciminiera","sequence":"additional","affiliation":[]},{"given":"Fulvio","family":"Risso","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,10,21]]},"reference":[{"key":"9181_CR1","unstructured":"Moore, D., Keys, K., Koga, R., Lagache, E., Claffy, K.C.: The coralreef software suite as a tool for system and network administrators. In: LISA \u201901: Proceedings of the 15th USENIX Conference on System Administration, pp. 133\u2013144. USENIX Association, Berkeley (2001)"},{"issue":"1","key":"9181_CR2","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1145\/1198255.1198257","volume":"37","author":"M. Crotti","year":"2007","unstructured":"Crotti, M., Dusi, M., Gringoli, F., Salgarelli, L.: Traffic classification through simple statistical fingerprinting. SIGCOMM Comput. Commun. Rev. 37(1):5\u201316 (2007)","journal-title":"SIGCOMM Comput. Commun. Rev."},{"issue":"4","key":"9181_CR3","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1145\/1282427.1282386","volume":"37","author":"D. Bonfiglio","year":"2007","unstructured":"Bonfiglio, D., Mellia, M., Meo, M., Rossi, D., Tofanelli, P.: Revealing skype traffic: when randomness plays with you. SIGCOMM Comput. Commun. Rev. 37(4):37\u201348 (2007)","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"9181_CR4","doi-asserted-by":"crossref","first-page":"2476","DOI":"10.1016\/j.comnet.2009.05.003","volume":"53","author":"A. Este","year":"2009","unstructured":"Este, A., Gringoli, F., Salgarelli, L.: Support vector machines for TCP traffic classification. Elsevier Comput. Netw. 53:2476\u20132490 (2009)","journal-title":"Elsevier Computer Networks"},{"key":"9181_CR5","doi-asserted-by":"crossref","unstructured":"Finamore, A., Mellia, M., Meo, M., Rossi, D.: Kiss: Stochastic packet inspection. In: TMA \u201909: Proceedings of the First International Workshop on Traffic Monitoring and Analysis, pp. 117\u2013125. Springer, Berlin (2009)","DOI":"10.1007\/978-3-642-01645-5_14"},{"key":"9181_CR6","doi-asserted-by":"crossref","unstructured":"Erman, J., Mahanti, A., Arlitt, M., Williamson, C.: Identifying and discriminating between web and peer-to-peer traffic in the network core. In: WWW \u201907: Proceedings of the 16th International Conference on World Wide Web, pp. 883\u2013892. ACM, New York (2007)","DOI":"10.1145\/1242572.1242692"},{"key":"9181_CR7","doi-asserted-by":"crossref","unstructured":"Erman, J., Arlitt, M., Mahanti, A.: Traffic classification using clustering algorithms. In: MineNet \u201906: Proceedings of the 2006 SIGCOMM Workshop on Mining Network Data, pp. 281\u2013286. ACM, New York (2006)","DOI":"10.1145\/1162678.1162679"},{"key":"9181_CR8","doi-asserted-by":"crossref","unstructured":"Karagiannis, T., Papagiannaki, K., Faloutsos, M.: Blinc: multilevel traffic classification in the dark. In: SIGCOMM \u201905: Proceedings of the 2005 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, pp. 229\u2013240. ACM, New York (2005)","DOI":"10.1145\/1080091.1080119"},{"key":"9181_CR9","doi-asserted-by":"crossref","unstructured":"Zander, S., Nguyen, T.T.T., Armitage, G.J.: Self-learning ip traffic classification based on statistical flow characteristics. In: Proceedings of Passive and Active Measurements Workshop. Lecture Notes in Computer Science, vol. 3431, pp. 325\u2013328. Springer, New York (2005)","DOI":"10.1007\/978-3-540-31966-5_26"},{"key":"9181_CR10","doi-asserted-by":"crossref","unstructured":"Moore A.W., Zuev D.: Internet traffic classification using bayesian analysis techniques. In: SIGMETRICS \u201905: Proceedings of the 2005 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, pp. 50\u201360. ACM, New York (2005)","DOI":"10.1145\/1064212.1064220"},{"issue":"2","key":"9181_CR11","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1145\/1129582.1129589","volume":"36","author":"L. Bernaille","year":"2006","unstructured":"Bernaille, L., Teixeira, R., Akodkenou, I., Soule, A., Salamatian, K.: Traffic classification on the fly. SIGCOMM Comput. Commun. Rev. 36(2):23\u201326 (2006)","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"9181_CR12","doi-asserted-by":"crossref","unstructured":"Bernaille, L., Teixeira, R., Salamatian, K.: Early application identification. In: CoNEXT \u201906: Proceedings of the 2006 ACM CoNEXT Conference, pp. 1\u201312. ACM, New York (2006)","DOI":"10.1145\/1368436.1368445"},{"key":"9181_CR13","doi-asserted-by":"crossref","unstructured":"Cascarano, N., Este, A., Gringoli, F., Risso, F., Salgarelli, L.: An experimental evaluation of the computational cost of a DPI traffic classifier. In: Proceedings of IEEE Globecom 2009, Next-Generation Networking and Internet Symposium, pp. 1132\u20131139. IEEE, New York (2009)","DOI":"10.1109\/GLOCOM.2009.5425469"},{"key":"9181_CR14","first-page":"207","volume":"38","author":"F. Gringoli","year":"2009","unstructured":"Gringoli, F., Salgarelli, L., Dusi, M., Cascarano, N., Risso, F., Claffy, K.: Gt: picking up the truth from the ground for internet traffic. SIGCOMM Comput. Commun. Rev. 38:207\u2013218 (2009)","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"9181_CR15","doi-asserted-by":"crossref","unstructured":"Becchi, M., Franklin, M., Crowley, P.: A workload for evaluating deep packet inspection architectures. In: Proceedings of the 2008 IEEE International Symposium on Workload Characterization. IEEE, Seattle, September 2008","DOI":"10.1109\/IISWC.2008.4636093"},{"issue":"4","key":"9181_CR16","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1145\/1402946.1402983","volume":"38","author":"R. Smith","year":"2008","unstructured":"Smith, R., Estan, C., Jha, S., Kong, S.: Deflating the big bang: fast and scalable deep packet inspection with extended finite automata. SIGCOMM Comput. Commun. Rev. 38(4), 207\u2013218 (2008)","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"9181_CR17","doi-asserted-by":"crossref","unstructured":"Becchi, M., Crowley, P.: Extending finite automata to efficiently match perl-compatible regular expressions. In: Proceedings of the International Conference on emerging Networking EXperiments and Technologies (CoNEXT). ACM, Madrid (2008)","DOI":"10.1145\/1544012.1544037"},{"key":"9181_CR18","doi-asserted-by":"crossref","unstructured":"Becchi, M., Crowley, P.: An improved algorithm to accelerate regular expression evaluation. In: Proceedings of the 2007 ACM\/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS). ACM, Orlando (2007)","DOI":"10.1145\/1323548.1323573"},{"key":"9181_CR19","doi-asserted-by":"crossref","unstructured":"Kumar, S., Dharmapurikar, S., Yu, F., Crowley, P., Turner, J.: Algorithms to accelerate multiple regular expressions matching for deep packet inspection. In: SIGCOMM 2006, pp. 339\u2013350. ACM, New York (2006)","DOI":"10.1145\/1159913.1159952"},{"key":"9181_CR20","volume-title":"Statistical Learning Theory","author":"V. Vapnik","year":"1998","unstructured":"Vapnik, V.: Statistical Learning Theory. Wiley, New York (1998)"},{"issue":"23-24","key":"9181_CR21","doi-asserted-by":"crossref","first-page":"2435","DOI":"10.1016\/S1389-1286(99)00112-7","volume":"31","author":"V. Paxson","year":"1999","unstructured":"Paxson, V.: Bro: a system for detecting network intruders in real-time. Comput. Networks 31(23-24), 2435\u20132463 (1999)","journal-title":"Comput. Networks"},{"key":"9181_CR22","unstructured":"Roesch, M.: Snort\u2014lightweight intrusion detection for networks. In: LISA \u201999: Proceedings of the 13th USENIX conference on System administration, pp. 229\u2013238. USENIX Association, Berkeley (1999)"},{"key":"9181_CR23","doi-asserted-by":"crossref","unstructured":"Moore A.W., Papagiannaki, K.: Toward the accurate identification of network applications. In In PAM, pp. 41\u201354 (2005)","DOI":"10.1007\/978-3-540-31966-5_4"},{"key":"9181_CR24","doi-asserted-by":"crossref","unstructured":"Risso, F., Baldi, M., Morandi, O., Baldini, A., Monclus, P.: Lightweight, payload-based traffic classification: An experimental evaluation. In: IEEE International Conference on, International Conference on Communications (ICC), pp. 5869\u20135875 (2008)","DOI":"10.1109\/ICC.2008.1097"},{"key":"9181_CR25","unstructured":"l7-filter: Application Layer Packet Classifier for Linux. http:\/\/filter.sourceforge.net\/"},{"key":"9181_CR26","unstructured":"Computer Networks Group: NetPDL Protocol Database: http:\/\/www.nbee.org\/netpdl , Politecnico di Torino"},{"key":"9181_CR27","unstructured":"Becchi, M.: Regular Expression Processor: http:\/\/regex.wustl.edu . Washington University, St. Louis, (2008)"},{"key":"9181_CR28","doi-asserted-by":"crossref","unstructured":"Becchi, M., Wiseman, C., Crowley, P.: Evaluating regular expression matching engines on network and general purpose processors. In: Proceedings of the 2009 ACM\/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS\u201909). ACM, New York (2009)","DOI":"10.1145\/1882486.1882495"}],"container-title":["Journal of Network and Systems Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-010-9181-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10922-010-9181-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-010-9181-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,5]],"date-time":"2019-06-05T16:46:52Z","timestamp":1559753212000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10922-010-9181-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10,21]]},"references-count":28,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2011,3]]}},"alternative-id":["9181"],"URL":"https:\/\/doi.org\/10.1007\/s10922-010-9181-x","relation":{},"ISSN":["1064-7570","1573-7705"],"issn-type":[{"value":"1064-7570","type":"print"},{"value":"1573-7705","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,10,21]]}}}