81
Views
1
CrossRef citations to date
0
Altmetric
Original Articles

Flow Cluster Algorithm Based on Improved K-means Method

, , &
Pages 326-333 | Published online: 01 Sep 2014

References

  • Available from: http://www.iana.org/assignments/port-numbers [Last accessed on 2011].
  • T Karagiannis, K Papagiannaki, and M Faloutsos, “Blinc: Multilevel traffic classification in the dark,” In: ACM SIGCOMM Computer Communication Review, Vol. 35, pp. 229–40, 2005.
  • Y Wang, Y Xiang, W Zhou, and S Yu, “Generating regular expression signatures for network traffic classification in trusted network management,” Journal of Network and Computer Applications, Vol. 35, pp. 992–1000, 2012.
  • A Moore, and D Zuev, “Internet traffic classification using bayesian analysis techniques,” In: ACM SIGMETRICS Performance Evaluation Review, Vol. 33, pp. 50–60, 2005.
  • T Karagiannis, A Broido, M Faloutsos, “Transport layer identification of p2p traffic,” In: Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, pp. 121–34, 2004.
  • P Bermolen, M Mellia, M Meo, D Rossi, and S Valenti, “Abacus: Accurate behavioral classification of p2p-tv traffic,” Computer Networks, Vol. 55, pp. 1394–11, 2011.
  • R Keralapura, A Nucci, and C Chuah, “A novel self-learning architecture for p2p traffic classification in high speed networks,” Computer Networks, Vol. 54, pp. 1055–68, 2010.
  • K Xu, M Zhang, M Ye, D Chiu, and J Wu, “Identify p2p traffic by inspecting data transfer behavior,” Computer Communications, Vol. 33, pp. 1141–50, 2010.
  • S Moln’ar, and M Per’enyi, “On the identification and analysis of skype traffic,” International Journal of Communication Systems, Vol. 24, pp. 94–117, 2011.
  • A McGregor, M Hall, P Lorier, and J Brunskill, “Flow clustering using machine learning techniques,” Passive and Active Network Measurement, pp. 205–14, 2004.
  • S Zander, T Nguyen, and G Armitage, “Automated traffic classification and application identification using machine learning,” In: Local Computer Networks, 30th Anniversary. The IEEE Conference on, 2005. pp. 250–7,2005.
  • J Erman, A Mahanti, and M Arlitt, “Qrp05-4: Internet traffic identification using machine learning,“ In: Global Telecommunications Conference, 2006. GLOBECOM'06. IEEE, pp. 1–6, 2006.
  • J Erman, M Arlitt, and A Mahanti, “Traffic classification using clustering algorithms,” In: Proceedings of the 2006 SIGCOMM workshop on Mining network data, pp. 281–6, 2006.
  • J Erman, A Mahanti, M Arlitt, I Cohen, and C Williamson, “Semi-supervised network traffic classification,“ In: ACM SIGMETRICS Performance Evaluation Review, Vol. 35, pp. 369–70, 2007.
  • A Moore, and K Papagiannaki, “Toward the accurate identification of network applications,” Passive and Active Network Measurement, pp. 41–54, 2005.
  • A Jain, and R Dubes, “Algorithms for clustering data,” New jersey, USA: Prentice-Hall, Inc.; 1988.
  • J Levandoski, E Sommer, and M Strait, “Application layer packet classifier for linux,” 2008. Available from: http://www.l7-filter. sourceforge.net.
  • P Tan, M Steinbach, and V Kumar, “Introduction to data mining,“ India: Pearson Addison Wesley Boston; 2006.
  • D Rogers, and T Tanimoto, “A computer program for classifying plants,” Science Vol. 132, no. 3434, pp. 1115, 1960.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.