BitMiner: Bits Mining in Internet Traffic Classification
Abstract
References
Index Terms
- BitMiner: Bits Mining in Internet Traffic Classification
Recommendations
BitMiner: Bits Mining in Internet Traffic Classification
SIGCOMM '15: Proceedings of the 2015 ACM Conference on Special Interest Group on Data CommunicationTraditionally, signatures used for traffic classification are constructed at the byte-level. However, as more and more data-transfer formats of network protocols and applications are encoded at the bit-level, byte-level signatures are losing their ...
Class-of-service mapping for QoS: a statistical signature-based approach to IP traffic classification
IMC '04: Proceedings of the 4th ACM SIGCOMM conference on Internet measurementThe ability to provide different Quality of Service (QoS) guarantees to traffic from different applications is a highly desired feature for many IP network operators, particularly for enterprise networks. Although various mechanisms exist for providing ...
HClass: Fast hybrid network traffic classification with bit and keyword level signatures
Deep Packet Inspection (DPI) methods are extensively used in traffic classification. These methods extract unique application content either at byte or bit level granularity and represent them as signatures. DPI involves string or regular expression ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
- August 2015684 pagesISBN:9781450335423DOI:10.1145/2785956
- General Chairs:
- Steve Uhlig,
- Olaf Maennel,
- Program Chairs:
- Brad Karp,
- Jitendra Padhye
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Poster
Funding Sources
- National Key Technology R&D Program of China
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- View Citations6Total Citations
- 464Total Downloads
- Downloads (Last 12 months)76
- Downloads (Last 6 weeks)19
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in