APPLYING BAYESIAN TRUST SAMPLING TO P2P TRAFFIC INSPECTION

Chunzhi Wang, Dongyang Yu, Hongwei Chen, and Hui Xu

References

  1. [1] C.Z. Wang, S.P. Wang, H.W. Chen, A LRU-based query algorithm for Gnutella Networks, Control & Intelligent Systems, 42(1), 2014, 31–37.
  2. [2] R. Keralapura, A. Nucci, and C. Chuah, A novel self-learning architecture for P2P traffic classification in high speed networks, Computer Networks, 54(7), 2010, 1055–1068.
  3. [3] B. Xu, M. Chen, and X. Wei, Hidden Markov model-basedP2P traffic identification: A hidden Markov model-based P2Ptraffic identification method, IET Communications, 6(13),2012, 2091–2098.
  4. [4] H. L. Chu, H. B. Yi, X. M. Zhang, A new P2P trafficidentification methodology based on traffic statistics, 2011IEEE 3rd International Conf. on Communication Softwareand Networks (ICCSN), (Piscataway, NJ: IEEE Press, 2011),277–281.
  5. [5] M. Soysal and E.G. Schmidt, Machine learning algorithms for accurate traffic-based network traffic classification: Evaluation and comparison, Performance Evaluation, 67(6), 2010, 451–467.
  6. [6] R. Yuan, Z. Li, X. Guan, and L. Xu, An SVM-based machine learning method for accurate internet traffic classification, Information Systems Frontiers, 12(2), 2010, 149–156.
  7. [7] W. Zhong, B. Raahemi, and J. Liu, Classifying peer-to-peer applications using imbalanced concept-adapting very fast decision tree on IP data stream, Peer-to-Peer Networking and Applications, 6(3), 2013, 233–246.
  8. [8] K. Huang and D.F. Zhang, An index-split bloom filter for deep packet inspection, Science China Information Sciences, 54(1), 2011, 23–37.
  9. [9] H. Xu, S. Wang, R. Wang, and D. Zhao, Research of P2Ptraffic identification based on naive Bayes and decision tables combination algorithm, 2010 Seventh International Conf. on Fuzzy Systems and Knowledge Discovery (FSKD), (Piscataway, NJ: IEEE Press, 2010), 2875–2879.
  10. [10] I. Ullah, G. Doyen, G. Bonnet, and D. Ga¨ıti, A Bayesian approach for user aware peer-to-peer video streaming systems, Signal Processing: Image Communication, 27(5), 2012, 38–456.
  11. [11] F. Rodr´ıguez-Teja, C. Martinez-Cagnazzo, and E.G. Castro, Bayesian classification: Methodology for network traffic classification combination, Proc. of the 6th International Wireless Communications and Mobile Computing Conf. (IWCMC ’10), (Piscataway, NJ: IEEE Press, 2010).
  12. [12] M. Nielsen, K. Krukow, and V. Sassone, A Bayesian model for event-based trust, Electronic Notes in Theoretical Computer Science, 172, 2007, 499–521.
  13. [13] M.K. Denko, T. Sun, and I. Woungang, Trust managementin ubiquitous computing: A Bayesian approach, ComputerCommunications, 34(3), 2011, 398–406.
  14. [14] H. Akcan, A. Astashyn, and H. Br¨onnimann, Determinis-tic algorithms for sampling count data, Data & KnowledgeEngineering, 64(2), 2008, 405–418.

Important Links:

Go Back