{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,16]],"date-time":"2023-09-16T16:42:25Z","timestamp":1694882545794},"reference-count":46,"publisher":"Elsevier BV","issue":"12","content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1016\/j.comcom.2013.05.004","type":"journal-article","created":{"date-parts":[[2013,5,21]],"date-time":"2013-05-21T23:30:54Z","timestamp":1369179054000},"page":"1329-1340","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":23,"title":["Online NetFPGA decision tree statistical traffic classifier"],"prefix":"10.1016","volume":"36","author":[{"given":"Alireza","family":"Monemi","sequence":"first","affiliation":[]},{"given":"Roozbeh","family":"Zarei","sequence":"additional","affiliation":[]},{"given":"Muhammad N.","family":"Marsono","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.comcom.2013.05.004_b0005","doi-asserted-by":"crossref","first-page":"2257","DOI":"10.1016\/j.comcom.2008.02.016","article-title":"Network utility maximization for triple-play services","volume":"31","author":"Shi","year":"2008","journal-title":"Computer Communications"},{"key":"10.1016\/j.comcom.2013.05.004_b0010","doi-asserted-by":"crossref","unstructured":"R.D. Torres, M.Y. Hajjat, S.G. Rao, M. Mellia, M.M. Munafo, Inferring undesirable behavior from P2P traffic analysis, in: Proceedings of the Eleventh International Joint Conference on Measurement and Modeling of Computer Systems (SIGMETRICS \u201909), pp. 25\u201336.","DOI":"10.1145\/2492101.1555353"},{"key":"10.1016\/j.comcom.2013.05.004_b0015","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1145\/1129582.1129589","article-title":"Traffic classification on the fly","volume":"36","author":"Bernaille","year":"2006","journal-title":"SIGCOMM Computer Communication Review"},{"key":"10.1016\/j.comcom.2013.05.004_b0020","unstructured":"W. Li, A.W. Moore, A machine learning approach for efficient traffic classification, in: Proceedings of the 15th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS \u201907), Washington, DC, USA, pp. 310\u2013317."},{"key":"10.1016\/j.comcom.2013.05.004_b0025","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1007\/s10796-008-9131-2","article-title":"An SVM-based machine learning method for accurate internet traffic classification","volume":"12","author":"Yuan","year":"2010","journal-title":"Information Systems Frontiers"},{"key":"10.1016\/j.comcom.2013.05.004_b0030","unstructured":"B.-C. Park, Y. Won, M.-S. Kim, J. Hong, Towards automated application signature generation for traffic identification, in: Network Operations and Management Symposium, (NOMS), IEEE, pp. 160\u2013167."},{"key":"10.1016\/j.comcom.2013.05.004_b0035","unstructured":"W. Li, K. Abdin, R. Dann, A. Moore, Approaching real-time network traffic classification, Technical Report RR-06-12, Queen Mary, University of London, Department of Computer Science, 2006."},{"key":"10.1016\/j.comcom.2013.05.004_b0040","doi-asserted-by":"crossref","unstructured":"A.W. Moore, K. Papagiannaki, Toward the accurate identification of network applications, in: PAM, pp. 41\u201354.","DOI":"10.1007\/978-3-540-31966-5_4"},{"key":"10.1016\/j.comcom.2013.05.004_b0045","unstructured":"Packeteer, 2012. ."},{"key":"10.1016\/j.comcom.2013.05.004_b0050","unstructured":"R. Sommer, A. Feldman, An IDS using NetFlow data retrieved March 2008, 2008."},{"key":"10.1016\/j.comcom.2013.05.004_b0055","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1145\/1090191.1080119","article-title":"BLINC: multilevel traffic classification in the dark","volume":"35","author":"Karagiannis","year":"2005","journal-title":"SIGCOMM Computer Communication Review"},{"key":"10.1016\/j.comcom.2013.05.004_b0060","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1145\/1071690.1064220","article-title":"Internet traffic classification using bayesian analysis techniques","volume":"33","author":"Moore","year":"2005","journal-title":"SIGMETRICS Performance Evaluation Review"},{"key":"10.1016\/j.comcom.2013.05.004_b0065","series-title":"Proceedings of the IEEE Conference on Local Computer Networks 30th Anniversary (LCN \u201905)","first-page":"250","article-title":"Automated traffic classification and application identification using machine learning","author":"Zander","year":"2005"},{"key":"10.1016\/j.comcom.2013.05.004_b0070","unstructured":"J. Erman, A. Mahanti, M. Arlitt, Internet traffic identification using machine learning techniques, in: Proceedings of the 49th IEEE GLOBECOM, San Francisco, USA, pp. 1\u20136."},{"key":"10.1016\/j.comcom.2013.05.004_b0075","unstructured":"Y. Wang, S.Z. Yu, Machine learned real-time traffic classifiers, in: Second International Symposium on Intelligent Information Technology Application (IITA \u201908), vol. 3, pp. 449\u2013454."},{"key":"10.1016\/j.comcom.2013.05.004_b0080","doi-asserted-by":"crossref","unstructured":"R. Bar Yanai, M. Langberg, D. Peleg, L. Roditty, Realtime classification for encrypted traffic, in: Proceedings of the Ninth International Conference on Experimental Algorithms (SEA\u201910), Berlin, Heidelberg, pp. 373\u2013385.","DOI":"10.1007\/978-3-642-13193-6_32"},{"key":"10.1016\/j.comcom.2013.05.004_b0085","doi-asserted-by":"crossref","first-page":"1009","DOI":"10.4304\/jsw.6.6.1009-1016","article-title":"Realtime encrypted traffic identification using machine learning","volume":"6","author":"Gu","year":"2011","journal-title":"Journal of Software"},{"key":"10.1016\/j.comcom.2013.05.004_b0090","series-title":"Proceedings of the Fouth ACM SIGCOMM conference on Internet measurement, IMC \u201904","first-page":"135","article-title":"Class-of-service mapping for QoS: a statistical signature-based approach to IP traffic classification","author":"Roughan","year":"2004"},{"key":"10.1016\/j.comcom.2013.05.004_b0095","unstructured":"A. Moore, M. Crogan, A.W. Moore, Q. Mary, D. Zuev, M.L. Crogan, Discriminators for use in flow-based classification, Technical Report RR-05-13, Department of Computer Science, Queen Mary, University of London, Mile End Road, London E1 4NS, UK, 2005."},{"issue":"Supplement","key":"10.1016\/j.comcom.2013.05.004_b0100","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1016\/S1005-8885(08)60158-2","article-title":"Real-time feature selection in traffic classification","volume":"15","author":"Zhao","year":"2008","journal-title":"The Journal of China Universities of Posts and Telecommunications"},{"key":"10.1016\/j.comcom.2013.05.004_b0105","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1145\/1163593.1163596","article-title":"A preliminary performance comparison of five machine learning algorithms for practical IP traffic flow classification","volume":"36","author":"Williams","year":"2006","journal-title":"SIGCOMM Computer Communication Review"},{"key":"10.1016\/j.comcom.2013.05.004_b0110","doi-asserted-by":"crossref","first-page":"1097","DOI":"10.1109\/TNN.2003.816362","article-title":"A compact 3D VLSI classifier using bagging threshold network ensembles","volume":"14","author":"Bermak","year":"2003","journal-title":"IEEE Transactions on Neural Networks"},{"key":"10.1016\/j.comcom.2013.05.004_b0115","unstructured":"S. Lopez-Estrada, R. Cumplido, Decision tree based FPGA-architecture for texture sea state classification, in: IEEE International Conference on Reconfigurable Computing and FPGA\u2019s, pp. 1\u20137."},{"key":"10.1016\/j.comcom.2013.05.004_b0120","unstructured":"Y. Qi, J. Fong, W. Jiang, B. Xu, J. Li, V. Prasanna, Multi-dimensional packet classification on FPGA: 100Gbps and beyond, in: International Conference on Field-Programmable Technology (FPT), pp. 241\u2013248."},{"key":"10.1016\/j.comcom.2013.05.004_b0125","series-title":"FPL","first-page":"56","article-title":"Real-time classification of multimedia traffic using FPGA","author":"Weirong","year":"2010"},{"key":"10.1016\/j.comcom.2013.05.004_b0130","unstructured":"T.T.T. Nguyen, G. Armitage, Training on multiple sub-flows to optimise the use of machine learning classifiers in real-world IP networks, in: Proceedings of the IEEE 31st Conference on Local, Computer Networks, pp. 369\u2013376."},{"key":"10.1016\/j.comcom.2013.05.004_b0135","series-title":"Proceedings of the 5th ACM\/IEEE Symposium on Architectures for Networking and Communications Systems, (ANCS \u201909)","first-page":"209","article-title":"Experience with high-speed automated application-identification for network-management","author":"Canini","year":"2009"},{"key":"10.1016\/j.comcom.2013.05.004_b0140","unstructured":"J.W. Lockwood, N. McKeown, G. Watson, G. Gibb, P. Hartke, J. Naous, R. Raghuraman, J. Luo, NetFPGA \u2013 An open platform for Gigabit-rate network switching and routing, in: Proceedings of, IEEE International Conference on Microelectronic Systems Education, pp. 160\u2013161."},{"key":"10.1016\/j.comcom.2013.05.004_b0145","unstructured":"NetFPGA, 2012. ."},{"key":"10.1016\/j.comcom.2013.05.004_b0150","unstructured":"NetFlowProb, 2012. ."},{"key":"10.1016\/j.comcom.2013.05.004_b0155","unstructured":"M. Shahbaz, Z. Ahmed, H. Jamal, A. Ashraf, N. Yousuf, R.N. Khan, Addition of virtual interfaces in NetFlow probe for the NetFPGA, in: First European NetFPGA Developers Workshop."},{"key":"10.1016\/j.comcom.2013.05.004_b0160","unstructured":"M. Bahrololum, E. Salahi, M. Khaleghi, Machine learning techniques for feature reduction in intrusion detection systems: a comparison, in: Fourth International Conference on Computer Sciences and Convergence Information Technology, (ICCIT \u201909), pp. 1091\u20131095."},{"key":"10.1016\/j.comcom.2013.05.004_b0165","unstructured":"X. Tian, Q. Sun, X. Huang, Y. Ma, A dynamic online traffic classification methodology based on data stream mining, in: WRI World Congress on Computer Science and Information, Engineering, vol. 1, pp. 298\u2013302."},{"key":"10.1016\/j.comcom.2013.05.004_b0170","first-page":"373","article-title":"Retraining mechanism for on-line peer-to-peer traffic classification","volume":"vol. 182","author":"Zarei","year":"2013"},{"key":"10.1016\/j.comcom.2013.05.004_b0175","unstructured":"W. Jiang, Q. Wang, V. Prasanna, Beyond TCAMs: an SRAM-based parallel multi-pipeline architecture for Terabit IP lookup, in: The 27th Conference on Computer Communications, IEEE, pp. 1786\u20131794."},{"key":"10.1016\/j.comcom.2013.05.004_b0180","unstructured":"Xilinx, Inc., An overview of multiple CAM designs in Virtex family devices, 2012. ."},{"key":"10.1016\/j.comcom.2013.05.004_b0185","unstructured":"Breiman L, J.H. Friedman, R.A. Olshen, C.J. Stone., Classification and regression trees, Pacific Grove, 1984."},{"key":"10.1016\/j.comcom.2013.05.004_b0190","first-page":"119","article-title":"Parameterizable decision tree classifier on netfpga","volume":"vol. 182","author":"Monemi","year":"2013"},{"key":"10.1016\/j.comcom.2013.05.004_b0195","doi-asserted-by":"crossref","unstructured":"F. Gringoli, L. Salgarelli, M. Dusi, N. Cascarano, F. Risso, k. claffy, GT: picking up the truth from the ground for Internet traffic, ACM SIGCOMM Computer Communication Review (CCR), 2009.","DOI":"10.1145\/1629607.1629610"},{"key":"10.1016\/j.comcom.2013.05.004_b0200","unstructured":"Weka. ."},{"key":"10.1016\/j.comcom.2013.05.004_b0205","unstructured":"R. Quinlan, Ross Quinlans Personal Homepage, 2012. ."},{"key":"10.1016\/j.comcom.2013.05.004_b0210","unstructured":"TCPreplay, 2012. ."},{"key":"10.1016\/j.comcom.2013.05.004_b0215","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1145\/1851275.1851194","article-title":"Internet inter-domain traffic","volume":"40","author":"Labovitz","year":"2010","journal-title":"SIGCOMM Computer Communication Review"},{"key":"10.1016\/j.comcom.2013.05.004_b0220","unstructured":"T. Karagiannis, A. Broido, M. Faloutsos, K. claffy, Transport layer identification of P2P traffic, in: Proceedings of the Fourth ACM SIGCOMM Conference on Internet Measurement, (IMC \u201904), pp. 121\u2013134."},{"key":"10.1016\/j.comcom.2013.05.004_b0225","doi-asserted-by":"crossref","unstructured":"R. Zarei, Practical training dataset generation and retraining mechanism for on-line Peer-to-Peer traffic classification, Universiti Teknologi Malaysia, Master Thesis, 2012.","DOI":"10.1007\/978-3-642-32063-7_40"},{"key":"10.1016\/j.comcom.2013.05.004_b0230","unstructured":"J. Naous, G. Gibb, S. Bolouki, N. McKeown, Netfpga: reusable router architecture for experimental research, in: Proceedings of the ACM Workshop on Programmable Routers for Extensible Services of Tomorrow, PRESTO \u201908, New York, NY, USA, pp. 1\u20137."}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366413001242?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366413001242?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,7,27]],"date-time":"2020-07-27T00:28:28Z","timestamp":1595809708000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0140366413001242"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":46,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2013,7]]}},"alternative-id":["S0140366413001242"],"URL":"http:\/\/dx.doi.org\/10.1016\/j.comcom.2013.05.004","relation":{},"ISSN":["0140-3664"],"issn-type":[{"value":"0140-3664","type":"print"}],"subject":["Computer Networks and Communications"],"published":{"date-parts":[[2013,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Online NetFPGA decision tree statistical traffic classifier","name":"articletitle","label":"Article Title"},{"value":"Computer Communications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.comcom.2013.05.004","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2013 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}