{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T00:22:52Z","timestamp":1772065372461,"version":"3.50.1"},"reference-count":67,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2014,7,17]],"date-time":"2014-07-17T00:00:00Z","timestamp":1405555200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Netw Syst Manage"],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1007\/s10922-014-9324-6","type":"journal-article","created":{"date-parts":[[2014,7,16]],"date-time":"2014-07-16T16:28:13Z","timestamp":1405528093000},"page":"830-869","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["How Robust Can a Machine Learning Approach Be for Classifying Encrypted VoIP?"],"prefix":"10.1007","volume":"23","author":[{"given":"Riyad","family":"Alshammari","sequence":"first","affiliation":[]},{"given":"A. Nur","family":"Zincir-Heywood","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,7,17]]},"reference":[{"key":"9324_CR1","unstructured":"IANA, Internet assigned numbers authority, http:\/\/www.iana.org\/assignments\/port-number (last Accessed Oct 2009)"},{"key":"9324_CR2","doi-asserted-by":"crossref","unstructured":"Moore, A.W., Papagiannaki, K.: Toward the accurate identification of network applications. In: Passive and Active Network Measurement: Proceedings of the Passive & Active Measurement Workshop, pp. 41\u201354 (2005)","DOI":"10.1007\/978-3-540-31966-5_4"},{"key":"9324_CR3","doi-asserted-by":"crossref","unstructured":"Madhukar, A., Williamson, C.: A longitudinal study of p2p traffic classification. In: Modeling, Analysis, and Simulation of Computer and Telecommunication Systems. MASCOTS 2006. 14th IEEE International Symposium on, pp. 179\u2013188 (2006)","DOI":"10.1109\/MASCOTS.2006.6"},{"key":"9324_CR4","doi-asserted-by":"crossref","unstructured":"Sen, S., Spatscheck, O., Wang, D.: Accurate, scalable in-network identification of p2p traffic using application signatures. In: WWW \u201904: Proceedings of the 13th International Conference on World Wide Web, pp. 512\u2013521. ACM, New York, NY, USA (2004)","DOI":"10.1145\/988672.988742"},{"key":"9324_CR5","doi-asserted-by":"crossref","unstructured":"Erman, J., Arlitt, M., Mahanti, A.: Traffic classification using clustering algorithms. In: MineNet \u201906: Proceedings of the 2006 SIGCOMM Workshop on Mining Network Data, pp. 281\u2013286. ACM Press, New York, NY, USA (2006)","DOI":"10.1145\/1162678.1162679"},{"key":"9324_CR6","doi-asserted-by":"crossref","unstructured":"Karagiannis, T., Papagiannaki, K., Faloutsos, M.: BLINC: multilevel traffic classification in the dark. In: SIGCOMM \u201905: Proceedings of the 2005 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, pp. 229\u2013240. ACM Press, New York, NY, USA (2005)","DOI":"10.1145\/1080091.1080119"},{"issue":"6","key":"9324_CR7","doi-asserted-by":"crossref","first-page":"1326","DOI":"10.1016\/j.comnet.2010.12.002","volume":"55","author":"R Alshammari","year":"2011","unstructured":"Alshammari, R., Zincir-Heywood, A.N.: Can encrypted traffic be identified without port numbers, IP addresses and payload inspection? Comput. Netw. 55(6), 1326\u20131350 (2011)","journal-title":"Comput. Netw."},{"issue":"2","key":"9324_CR8","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1145\/1129582.1129589","volume":"36","author":"L Bernaille","year":"2006","unstructured":"Bernaille, L., Teixeira, R., Akodkenou, I., Soule, A., Salamatian, K.: Traffic classification on the fly. SIGCOMM Comput. Commun. Rev. 36(2), 23\u201326 (2006)","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"9324_CR9","doi-asserted-by":"crossref","unstructured":"Moore, A.W., Zuev, D.: Internet traffic classification using bayesian analysis techniques. In: SIGMETRICS \u201905: Proceedings of the 2005 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, pp. 50\u201360. ACM Press, New York, NY, USA (2005)","DOI":"10.1145\/1064212.1064220"},{"key":"9324_CR10","doi-asserted-by":"crossref","unstructured":"Alshammari, R., Zincir-Heywood, A.N.: A flow based approach for ssh traffic detection. In: Proceedings of the IEEE International Conference on System, Man and Cybernetics\u2014SMC\u20192007 (2007)","DOI":"10.1109\/ICSMC.2007.4414006"},{"key":"9324_CR11","doi-asserted-by":"crossref","unstructured":"Alshammari, R., Zincir-Heywood, A.N.: Investigating two different approaches for encrypted traffic classification. In: PST \u201908: Proceedings of the 2008 Sixth Annual Conference on Privacy, Security and Trust, pp. 156\u2013166. IEEE Computer Society, Washington, DC, USA (2008)","DOI":"10.1109\/PST.2008.15"},{"key":"9324_CR12","doi-asserted-by":"crossref","unstructured":"Alshammari, R., Zincir-Heywood, N.: Generalization of signatures for ssh encrypted traffic identification. In: Computational Intelligence in Cyber Security. CICS \u201909. IEEE Symposium on, pp. 167\u2013174 (2009)","DOI":"10.1109\/CICYBS.2009.4925105"},{"key":"9324_CR13","doi-asserted-by":"crossref","unstructured":"Early, J., Brodley, C., Rosenberg, C.: Behavioral authentication of server flows. In: Proceedings of the 19th Annual Computer Security Applications Conference, pp. 46\u201355 (2003)","DOI":"10.1109\/CSAC.2003.1254309"},{"key":"9324_CR14","doi-asserted-by":"crossref","unstructured":"Haffner, P., Sen, S., Spatscheck, O., Wang, D.: ACAS: automated construction of application signatures. In: MineNet \u201905: Proceeding of the 2005 ACM SIGCOMM Workshop on Mining Network Data, pp. 197\u2013202. ACM Press, New York, NY, USA (2005)","DOI":"10.1145\/1080173.1080183"},{"key":"9324_CR15","unstructured":"Montigny-Leboeuf, A.D.: Flow Attributes for Use in Traffic Characterization, CRC Technical Note No. CRC-TN-2005-003, Feb 2005."},{"key":"9324_CR16","doi-asserted-by":"crossref","unstructured":"Wright, C., Monrose, F., Masson, G.M.: HMM profiles for network traffic classification. In: VizSEC\/DMSEC \u201904: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, pp. 9\u201315. ACM Press, New York, NY, USA (2004)","DOI":"10.1145\/1029208.1029211"},{"issue":"5","key":"9324_CR17","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1145\/1163593.1163596","volume":"36","author":"N Williams","year":"2006","unstructured":"Williams, N., Zander, S., Armitage, G.: A preliminary performance comparison of five machine learning algorithms for practical IP traffic flow classification. SIGCOMM Comput. Commun. Rev. 36(5), 5\u201316 (2006)","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"9324_CR18","doi-asserted-by":"crossref","unstructured":"Pise, N., Kulkarni, P.: A survey of semi-supervised learning methods. In: Computational Intelligence and Security. CIS \u201908. International Conference on, vol. 2, pp. 30\u201334 (2008)","DOI":"10.1109\/CIS.2008.204"},{"key":"9324_CR19","unstructured":"Alshammari, R.: Automatically classifying encrypted network traffic: a case study of ssh. Mater thesis, Dalhousie University, NS, Canada, 133 pp. (2008)"},{"key":"9324_CR20","unstructured":"Quinlan, J.: See5-comparison, http:\/\/www.rulequest.com\/see5-comparison.html (last Accessed Feb 2011)"},{"issue":"4","key":"9324_CR21","doi-asserted-by":"crossref","first-page":"433","DOI":"10.1016\/j.jnca.2010.02.002","volume":"33","author":"A Callado","year":"2010","unstructured":"Callado, A., Kelner, J., Sadok, D.: Alberto Kamienski C, Fernandes S.: Better network traffic identification through the independent combination of techniques. J. Netw. Comput. Appl. 33(4), 433\u2013446 (2010)","journal-title":"J. Netw. Comput. Appl."},{"issue":"4","key":"9324_CR22","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1109\/SURV.2008.080406","volume":"10","author":"T Nguyen","year":"2008","unstructured":"Nguyen, T., Armitage, G.: A survey of techniques for internet traffic classification using machine learning. Commun. Surv. Tutor. IEEE 10(4), 56\u201376 (2008)","journal-title":"Commun. Surv. Tutor. IEEE"},{"issue":"3","key":"9324_CR23","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1109\/SURV.2009.090304","volume":"11","author":"A Callado","year":"2009","unstructured":"Callado, A., Kamienski, C., Szabo, G., Gero, B., Kelner, J., Fernandes, S., Sadok, D.: A survey on internet traffic identification. Commun. Surv. Tutor. IEEE 11(3), 37\u201352 (2009)","journal-title":"Commun. Surv. Tutor. IEEE"},{"issue":"4","key":"9324_CR24","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1145\/1282427.1282386","volume":"37","author":"D Bonfiglio","year":"2007","unstructured":"Bonfiglio, D., Mellia, M., Meo, M., Rossi, D., Tofanelli, P.: Revealing skype traffic: when randomness plays with you. SIGCOMM Comput. Commun. Rev. 37(4), 37\u201348 (2007)","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"9324_CR25","doi-asserted-by":"crossref","unstructured":"Freire, E., Ziviani, A., Salles, R.: Detecting skype flows in web traffic. In: Network Operations and Management Symposium. NOMS 2008, pp. 89\u201396. IEEE (2008)","DOI":"10.1109\/NOMS.2008.4575121"},{"issue":"14","key":"9324_CR26","doi-asserted-by":"crossref","first-page":"2476","DOI":"10.1016\/j.comnet.2009.05.003","volume":"53","author":"A Este","year":"2009","unstructured":"Este, A., Gringoli, F., Salgarelli, L.: Support vector machines for TCP traffic classification. Comput. Netw. 53(14), 2476\u20132490 (2009)","journal-title":"Comput. Netw."},{"key":"9324_CR27","doi-asserted-by":"crossref","first-page":"1194","DOI":"10.1016\/j.peva.2007.06.014","volume":"64","author":"J Erman","year":"2007","unstructured":"Erman, J., Mahanti, A., Arlitt, M., Cohen, I., Williamson, C.: Offline\/realtime traffic classification using semi-supervised learning. Perform. Eval. 64, 1194\u20131213 (2007)","journal-title":"Perform. Eval."},{"key":"9324_CR28","first-page":"464","volume":"5","author":"C Bacquet","year":"2010","unstructured":"Bacquet, C., Gumus, K., Tizer, D., Zincir-Heywood, A., Heywood, M.I.: A comparison of unsupervised learning techniques for encrypted traffic identification. J. Inf. Assur. Secur. 5, 464\u2013472 (2010)","journal-title":"J. Inf. Assur. Secur."},{"issue":"8","key":"9324_CR29","doi-asserted-by":"crossref","first-page":"1909","DOI":"10.1016\/j.comnet.2011.01.020","volume":"55","author":"M Iliofotou","year":"2011","unstructured":"Iliofotou, M., Kim, H.C., Faloutsos, M., Mitzenmacher, M., Pappu, P., Varghese, G.: Graption: a graph-based p2p traffic classification framework for the internet backbone. Comput. Netw. 55(8), 1909\u20131920 (2011)","journal-title":"Comput. Netw."},{"key":"9324_CR30","doi-asserted-by":"crossref","unstructured":"Park, J., Tyan, H.-R., Kuo, C.-C.: Ga-based internet traffic classification technique for QoS provisioning. In: Intelligent Information Hiding and Multimedia Signal Processing. IIH-MSP \u201906. International Conference on, pp. 251\u2013254 (2006)","DOI":"10.1109\/IIH-MSP.2006.264991"},{"issue":"6","key":"9324_CR31","doi-asserted-by":"crossref","first-page":"849","DOI":"10.1016\/j.comnet.2008.11.005","volume":"53","author":"Y Hu","year":"2009","unstructured":"Hu, Y., Chiu, D.-M., Lui, J.C.S.: Profiling and identification of p2p traffic. Comput. Netw. 53(6), 849\u2013863 (2009)","journal-title":"Comput. Netw."},{"key":"9324_CR32","unstructured":"Wright, C.V., Coull, S.E., Monrose, F.: Traffic morphing: an efficient defense against statistical traffic analysis. In: Proceedings of the Network and Distributed Security Symposium\u2014NDSS \u201909 (2009)"},{"key":"9324_CR33","doi-asserted-by":"crossref","unstructured":"Wright, C.V., Ballard, L., Monrose, F., Masson, G.M.: Language identification of encrypted VoIP traffic: Alejandra y roberto or alice and bob? In: Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, pp. 4:1\u20134:12. USENIX Association, Berkeley, CA, USA (2007)","DOI":"10.1109\/MSP.2007.76"},{"key":"9324_CR34","doi-asserted-by":"crossref","unstructured":"Liberatore, M., Levine, B.N.: Inferring the source of encrypted http connections. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS \u201906, pp. 255\u2013263. ACM, New York, NY, USA (2006)","DOI":"10.1145\/1180405.1180437"},{"key":"9324_CR35","unstructured":"Skype, http:\/\/www.skype.com\/useskype\/"},{"key":"9324_CR36","doi-asserted-by":"crossref","unstructured":"Baset, S.A., Schulzrinne, H.G.: An analysis of the skype peer-to-peer internet telephony protocol. In: INFOCOM 2006. 25th IEEE International Conference on Computer Communications. Proceedings, pp. 1\u201311 (2006)","DOI":"10.1109\/INFOCOM.2006.312"},{"key":"9324_CR37","doi-asserted-by":"crossref","unstructured":"Bonfiglio, D., Mellia, M., Meo, M., Ritacca, N., Rossi, D.: Tracking down skype traffic. In: INFOCOM 2008. The 27th Conference on Computer Communications, pp. 261\u2013265. IEEE (2008)","DOI":"10.1109\/INFOCOM.2008.61"},{"key":"9324_CR38","doi-asserted-by":"crossref","unstructured":"De Cicco, L., Mascolo, S., Palmisano, V.: Skype video responsiveness to bandwidth variations. In: Proceedings of the 18th International Workshop on Network and Operating Systems Support for Digital Audio and Video (NOSSDAV \u201908), pp. 81\u201386. ACM, New York, NY, USA (2008)","DOI":"10.1145\/1496046.1496065"},{"key":"9324_CR39","unstructured":"Barbosa, R., Callado, A., Kamienski, C., Fernandes, S., Mariz, D., Sadok, D.: Performance evaluation of P2P VoIP application. In: Proceedings of the 17th International Workshop on Network and Operating Systems Support for Digital Audio and Video (NOSSDAV \u201907), IL, USA (2007)"},{"key":"9324_CR40","unstructured":"IETF, http:\/\/www3.ietf.org\/proceedings\/97apr\/97apr-final\/xrtftr70.htm"},{"key":"9324_CR41","unstructured":"NetMate, http:\/\/www.ip-measurement.org\/tools\/netmate\/"},{"key":"9324_CR42","unstructured":"Arndt, D.: How to calculating flow statistics using netmate, http:\/\/dan.arndt.ca\/nims\/calculating-flow-statistics-using-netmate\/ (last Accessed Sept 2011)"},{"key":"9324_CR43","unstructured":"Quinlan, J.: see5-info, http:\/\/www.rulequest.com\/see5-info.html (last Accessed July 2010)"},{"key":"9324_CR44","volume-title":"Introduction to Machine Learning","author":"E Alpaydin","year":"2004","unstructured":"Alpaydin, E.: Introduction to Machine Learning. MIT Press, Cambridge, MA (2004)"},{"key":"9324_CR45","doi-asserted-by":"crossref","unstructured":"Lichodzijewski, P., Heywood, M.I.: Managing team-based problem solving with symbiotic bid-based genetic programming. In: Proceedings of the Genetic and Evolutionary Computation Conference, pp. 363\u2013370 (2008)","DOI":"10.1145\/1389095.1389162"},{"issue":"1","key":"9324_CR46","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1162\/evco.2007.15.1.61","volume":"15","author":"E Jong de","year":"2007","unstructured":"de Jong, E.: A monotonic archive for pareto-coevolution. Evol. Comput. 15(1), 61\u201393 (2007)","journal-title":"Evol. Comput."},{"key":"9324_CR47","unstructured":"T. U. of Waikato, WEKA software, http:\/\/www.cs.waikato.ac.nz\/ml\/weka\/"},{"key":"9324_CR48","unstructured":"SBB-GP, Symbiotic bid-based (sbb) paradigm, http:\/\/www.cs.dal.ca\/mheywood\/Code\/SBB\/SCM.9.r20081212.tar.gz (last Accessed March 2008)"},{"key":"9324_CR49","unstructured":"PacketShaper, http:\/\/www.packeteer.com\/products\/p-acketshaper\/ (last Accessed March 2008). CalladoBetter2010"},{"key":"9324_CR50","unstructured":"Traces, S.: Telecommunication networks group\u2014politecnico ditorino, http:\/\/tstat.tlc.polito.it\/traces-skype.shtml (last Accessed August 2009)"},{"key":"9324_CR51","unstructured":"Alshamamri, R.: Downloading the NIMS data sets, http:\/\/web.cs.dal.ca\/riyad\/Site\/Download.html (last Accessed Sept 2011)"},{"key":"9324_CR52","unstructured":"Wireshark, http:\/\/www.wireshark.org\/ (last Accessed Sept 2008)"},{"key":"9324_CR53","unstructured":"Peeker, N.: Netpeeker, http:\/\/www.net-peekerCalladoBetter2010.com (last Accessed Oct 2009)"},{"key":"9324_CR54","unstructured":"Signalogic, Speech codec wav samples, http:\/\/www.signalogic.com\/index.pl?page=codec_samples (last Accessed Oct 2009)"},{"key":"9324_CR55","unstructured":"Zimmermann, P.: The Zfone project, http:\/\/zfoneproject.com\/ (last Accessed Oct 2009)"},{"key":"9324_CR56","doi-asserted-by":"crossref","unstructured":"Zimmermann, E.P., Johnston, A., Callas, J.: Zrtp: media path key agreement for secure rtp, http:\/\/tools.ietf.org\/html\/draft-zimmermann-avt-zrtp-17 (2010)","DOI":"10.17487\/rfc6189"},{"key":"9324_CR57","unstructured":"P. T. C. Inc, Primus softphone client, http:\/\/www.primus.ca\/en\/residential\/talkbroadband\/talkBroadband-softphone.htm (last Accessed Oct 2009)"},{"key":"9324_CR58","unstructured":"ETSI, Digital cellular telecommunications system (phase 2+), general packet radio service (gprs), overall description of the gprs radio interface, stage 2 (gsm 03.64, version 7.0.0, release 1999)"},{"key":"9324_CR59","unstructured":"BirdsSoft, Vpn-x, http:\/\/birdssoft.com\/ (last Accessed March 2011)"},{"key":"9324_CR60","doi-asserted-by":"crossref","unstructured":"Kent, S., Atkinson, R.: Security architecture for the internet protocol, http:\/\/www.ietf.org\/rfc\/rfc2401.txt (1998)","DOI":"10.17487\/rfc2401"},{"key":"9324_CR61","unstructured":"MAWI, Mawi working group traffic archive, http:\/\/tracer.csl.sony.co.jp\/mawi\/"},{"key":"9324_CR62","doi-asserted-by":"crossref","unstructured":"Fink, R., Hinden, R.: 6bone (IPv6 testing address allocation), http:\/\/tools.ietf.org\/html\/rfc3701 (2004)","DOI":"10.17487\/rfc3701"},{"key":"9324_CR63","unstructured":"Ehlert, S., Petgang, S., Magedanz, T., Sisalem, D.: Analysis and signature of Skype VoIP session traffic. In: CIIT 2006: 4th IASTED International Conference on Communications, Internet, and Information Technology, pp. 83\u201389 (2006)"},{"key":"9324_CR64","unstructured":"Skype, Skype garage, http:\/\/blogs.skype.com\/garage\/windows\/ (last Accessed Sept 2011)"},{"key":"9324_CR65","unstructured":"Valin, J.-M., Montgomery, C.: Improved noise weighting in CELP coding of speech\u2014applying the Vorbis psychoacoustic model to speex, http:\/\/www.speex.org (2006)"},{"key":"9324_CR66","unstructured":"N. software, Switch audio converter for mac, http:\/\/www.nch.com.au\/switch\/index.html (last Accessed May 2011)"},{"key":"9324_CR67","unstructured":"OpenDPI, the open source version of ipoque\u2019s dpi engine, http:\/\/www.opendpi.org\/ (last Accessed April 2011)"}],"container-title":["Journal of Network and Systems Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-014-9324-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10922-014-9324-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-014-9324-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,12]],"date-time":"2019-08-12T22:11:42Z","timestamp":1565647902000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10922-014-9324-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7,17]]},"references-count":67,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2015,10]]}},"alternative-id":["9324"],"URL":"https:\/\/doi.org\/10.1007\/s10922-014-9324-6","relation":{},"ISSN":["1064-7570","1573-7705"],"issn-type":[{"value":"1064-7570","type":"print"},{"value":"1573-7705","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,7,17]]}}}