{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T15:19:29Z","timestamp":1777389569078,"version":"3.51.4"},"reference-count":10,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2006,4,28]],"date-time":"2006-04-28T00:00:00Z","timestamp":1146182400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGCOMM Comput. Commun. Rev."],"published-print":{"date-parts":[[2006,4,28]]},"abstract":"<jats:p>The early detection of applications associated with TCP flows is an essential step for network security and traffic engineering. The classic way to identify flows, i.e. looking at port numbers, is not effective anymore. On the other hand, state-of-the-art techniques cannot determine the application before the end of the TCP flow. In this editorial, we propose a technique that relies on the observation of the first five packets of a TCP connection to identify the application. This result opens a range of new possibilities for online traffic classification.<\/jats:p>","DOI":"10.1145\/1129582.1129589","type":"journal-article","created":{"date-parts":[[2006,5,8]],"date-time":"2006-05-08T22:51:53Z","timestamp":1147128713000},"page":"23-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":425,"title":["Traffic classification on the fly"],"prefix":"10.1145","volume":"36","author":[{"given":"Laurent","family":"Bernaille","sequence":"first","affiliation":[{"name":"LIP6, Universit\u00e9 Pierre et Marie Curie, Paris, FRANCE"}]},{"given":"Renata","family":"Teixeira","sequence":"additional","affiliation":[{"name":"LIP6, Universit\u00e9 Pierre et Marie Curie, Paris, FRANCE"}]},{"given":"Ismael","family":"Akodkenou","sequence":"additional","affiliation":[{"name":"LIP6, Universit\u00e9 Pierre et Marie Curie, Paris, FRANCE"}]},{"given":"Augustin","family":"Soule","sequence":"additional","affiliation":[{"name":"Thomson Paris Lab"}]},{"given":"Kave","family":"Salamatian","sequence":"additional","affiliation":[{"name":"LIP6, Universit\u00e9 Pierre et Marie Curie, Paris, FRANCE"}]}],"member":"320","published-online":{"date-parts":[[2006,4,28]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Is P2P dying or just hiding?,\" in IEEE Globecom","author":"Karagiannis T.","year":"2004","unstructured":"T. Karagiannis , A. Broido , N. Brownlee , K. Claffy , and M. Faloutsos , \" Is P2P dying or just hiding?,\" in IEEE Globecom , 2004 . T. Karagiannis, A. Broido, N. Brownlee, K. Claffy, and M. Faloutsos, \"Is P2P dying or just hiding?,\" in IEEE Globecom, 2004."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028805"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1064212.1064220"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080091.1080119"},{"key":"e_1_2_1_5_1","volume-title":"Flow clustering using machine learning techniques,\" in Passive and Active Measurement Workshop","author":"McGregor A.","year":"2004","unstructured":"A. McGregor , M. Hall , P. Lorier , and J. Brunskill , \" Flow clustering using machine learning techniques,\" in Passive and Active Measurement Workshop , 2004 . A. McGregor, M. Hall, P. Lorier, and J. Brunskill, \"Flow clustering using machine learning techniques,\" in Passive and Active Measurement Workshop, 2004."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31966-5_25"},{"key":"e_1_2_1_7_1","unstructured":"J. McQueen \"Some methods for classification and analysis of multivariations \" in Symposium on Mathematical Statistics and Probability 1967.  J. McQueen \"Some methods for classification and analysis of multivariations \" in Symposium on Mathematical Statistics and Probability 1967."},{"key":"e_1_2_1_8_1","unstructured":"Qosmos \"www.qosmos.com.\"  Qosmos \"www.qosmos.com.\""},{"key":"e_1_2_1_9_1","unstructured":"Endace \"www.endace.com.\"  Endace \"www.endace.com.\""},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/948205.948235"}],"container-title":["ACM SIGCOMM Computer Communication Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1129582.1129589","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1129582.1129589","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T15:06:16Z","timestamp":1750259176000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1129582.1129589"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,4,28]]},"references-count":10,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2006,4,28]]}},"alternative-id":["10.1145\/1129582.1129589"],"URL":"https:\/\/doi.org\/10.1145\/1129582.1129589","relation":{},"ISSN":["0146-4833"],"issn-type":[{"value":"0146-4833","type":"print"}],"subject":[],"published":{"date-parts":[[2006,4,28]]},"assertion":[{"value":"2006-04-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}