參考文獻 |
[1] Kreutz, Diego, et al. "Software-defined networking: A comprehensive survey." Proceedings of the IEEE 103.1 (2014): 14-76.
[2] Mijumbi, Rashid, et al. "Network function virtualization: State-of-the-art and research challenges." IEEE Communications surveys & tutorials 18.1 (2015): 236-262.
[3] Silver Peak Systems, Inc., “SD-WAN Explained”, 2020. Accessed on: April 19, 2020. [Online]. Available: https://www.silver-peak.com/sd-wan/sd-wan-explained
[4] Alpaydin, Ethem. Introduction to machine learning. MIT press, 2020.
[5] Beale, Hagan Demuth, Howard B. Demuth, and M. T. Hagan. "Neural network design." Pws, Boston (1996).
[6] LeCun, Yann, Yoshua Bengio, and Geoffrey Hinton. "Deep learning." nature 521.7553 (2015): 436-444.
[7] Kaelbling, Leslie Pack, Michael L. Littman, and Andrew W. Moore. "Reinforcement learning: A survey." Journal of artificial intelligence research 4 (1996): 237-285.
[8] Mnih, Volodymyr, et al. "Playing atari with deep reinforcement learning." arXiv preprint arXiv:1312.5602 (2013).
[9] Ruder, Sebastian. "An overview of gradient descent optimization algorithms." arXiv preprint arXiv:1609.04747 (2016).
[10] McKeown, Nick, et al. "OpenFlow: enabling innovation in campus networks." ACM SIGCOMM Computer Communication Review 38.2 (2008): 69-74.
[11] Caraguay, Ángel Leonardo Valdivieso, et al. "SDN/NFV Architecture for IoT Networks." WEBIST. 2018.
[12] Davie, Bruce S., and Yakov Rekhter. MPLS: technology and applications. Morgan Kaufmann Publishers Inc., 2000.
[13] Dahlman, Erik, Stefan Parkvall, and Johan Skold. 4G: LTE/LTE-advanced for mobile broadband. Academic press, 2013.
[14] Cisco System, Inc., “Cisco Annual Internet Report (2018–2023) White Paper”, 2020. Accessed on April 20, 2020. [Online]. Available: https://www.cisco.com/c/en/us/solutions/collateral/executive-perspectives/annual-internet-report/white-paper-c11-741490.html
[15] Wang, Pan, et al. "A survey of techniques for mobile service encrypted traffic classification using deep learning." IEEE Access 7 (2019): 54024-54033.
[16] Yan, Jinghua, and Jing Yuan. "A survey of traffic classification in software defined networks." 2018 1st IEEE International Conference on Hot Information-Centric Networking (HotICN). IEEE, 2018.
[17] IANA. Internet Assigned Numbers Authority, “Internet Assigned Numbers Authority”, 2020. Accessed on: April 9, 2020. [Online]. Available: https://www.iana.org/
[18] Joe, Touch, et al. “Service Name and Transport Protocol Port Number Registry”, 2020. Accessed on: April 9, 2020. [Online]. Available: https://www.iana.org/assignments/service-names-port-numbers/service-names-port-numbers.xhtml
[19] Moore, Andrew W., and Konstantina Papagiannaki. "Toward the accurate identification of network applications." International Workshop on Passive and Active Network Measurement. Springer, Berlin, Heidelberg, 2005.
[20] Finsterbusch, Michael, et al. "A survey of payload-based traffic classification approaches." IEEE Communications Surveys & Tutorials 16.2 (2013): 1135-1156.
[21] ClearCenter, “L7-Filter | ClearFoundation | Deep Packet Inspection”, 2020. Accessed on April 9, 2020. [Online]. Available: https://l7-filter.clearos.com/
[22] ntop, “nDPI – ntop”, 2020. Accessed on: April 9, 2020. [Online]. Available: https://www.ntop.org/products/deep-packet-inspection/ndpi/
[23] Gringoli, Francesco, et al. "Gt: picking up the truth from the ground for internet traffic." ACM SIGCOMM Computer Communication Review 39.5 (2009): 12-18.
[24] Dainotti, Alberto, Antonio Pescape, and Kimberly C. Claffy. "Issues and future directions in traffic classification." IEEE network 26.1 (2012): 35-40.
[25] Da Silva, Anderson Santos, et al. "Identification and selection of flow features for accurate traffic classification in SDN." 2015 IEEE 14th International Symposium on Network Computing and Applications. IEEE, 2015.
[26] Liu, Chien-Chang, et al. "Svm-based classification mechanism and its application in sdn networks." 2018 10th International Conference on Communication Software and Networks (ICCSN). IEEE, 2018.
[27] Qazi, Zafar Ayyub, et al. "Application-awareness in SDN." Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM. 2013.
[28] Zaki, Fatimah Audah Md, and Tan Saw Chin. "FWFS: Selecting Robust Features Towards Reliable and Stable Traffic Classifier in SDN." IEEE Access 7 (2019): 166011-166020.
[29] Xu, Jun, et al. "Deep neural networks for application awareness in SDN-based network." 2018 IEEE 28th International Workshop on Machine Learning for Signal Processing (MLSP). IEEE, 2018.
[30] Parsaei, Mohammad Reza, et al. "Network traffic classification using machine learning techniques over software defined networks." International Journal of Advanced Computer Science and Applications 8.7 (2017): 220-225.
[31] Zhou, Huiyi, et al. "A method of improved CNN traffic classification." 2017 13th International Conference on Computational Intelligence and Security (CIS). IEEE, 2017.
[32] Wang, Pan, et al. "Datanet: Deep learning based encrypted network traffic classification in sdn home gateway." IEEE Access 6 (2018): 55380-55391.
[33] Wang, Wei, et al. "End-to-end encrypted traffic classification with one-dimensional convolution neural networks." 2017 IEEE International Conference on Intelligence and Security Informatics (ISI). IEEE, 2017.
[34] Bengio, Yoshua, Aaron Courville, and Pascal Vincent. "Representation learning: A review and new perspectives." IEEE transactions on pattern analysis and machine intelligence 35.8 (2013): 1798-1828.
[35] ISHA SALIAN, https://blogs.nvidia.com/blog/2018/08/02/supervised-unsupervised-learning/
[36] Dudani, Sahibsingh A. "The distance-weighted k-nearest-neighbor rule." IEEE Transactions on Systems, Man, and Cybernetics 4 (1976): 325-327.
[37] Noble, William S. "What is a support vector machine?." Nature biotechnology 24.12 (2006): 1565-1567.
[38] Safavian, S. Rasoul, and David Landgrebe. "A survey of decision tree classifier methodology." IEEE transactions on systems, man, and cybernetics 21.3 (1991): 660-674.
[39] Liaw, Andy, and Matthew Wiener. "Classification and regression by randomForest." R news 2.3 (2002): 18-22.
[40] Krishna, K., and M. Narasimha Murty. "Genetic K-means algorithm." IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) 29.3 (1999): 433-439.
[41] Johnson, Stephen C. "Hierarchical clustering schemes." Psychometrika 32.3 (1967): 241-254.
[42] Smyth, Padhraic. "Model selection for probabilistic clustering using cross-validated likelihood." Statistics and computing 10.1 (2000): 63-72.
[43] Watkins, Christopher JCH, and Peter Dayan. "Q-learning." Machine learning 8.3-4 (1992): 279-292.
[44] Sprague, Nathan, and Dana Ballard. "Multiple-goal reinforcement learning with modular sarsa (0)." (2003).
[45] Sutton, Richard S., et al. "Policy gradient methods for reinforcement learning with function approximation." Advances in neural information processing systems. 2000.
[46] Konda, Vijay R., and John N. Tsitsiklis. "Actor-critic algorithms." Advances in neural information processing systems. 2000.
[47] Mnih, Volodymyr, et al. "Playing atari with deep reinforcement learning." arXiv preprint arXiv:1312.5602 (2013).
[48] Mnih, Volodymyr, et al. "Human-level control through deep reinforcement learning." Nature 518.7540 (2015): 529-533.
[49] University of New Brunswick, “VPN-nonVPN dataset (ISCXVPN2016)”, 2016. Accessed on April 23, 2020. [Online]. Available: https://www.unb.ca/cic/datasets/vpn.html
[50] Zhou, Huiyi, et al. "A method of improved CNN traffic classification." 2017 13th International Conference on Computational Intelligence and Security (CIS). IEEE, 2017.
[51] Chiang, Yi-Rou, et al. "A multipath transmission scheme for the improvement of throughput over SDN." 2017 International Conference on Applied System Innovation (ICASI). IEEE, 2017.
[52] Yahya, Widhi, et al. "Improving End-to-End Network Throughput Using Multiple Best Paths Routing in Software Defined Networking." 2018 10th International Conference on Information Technology and Electrical Engineering (ICITEE). IEEE, 2018.
[53] Hossain, Md Billal, and Jin Wei. "Reinforcement Learning-Driven QoS-Aware Intelligent Routing for Software-Defined Networks." 2019 IEEE Global Conference on Signal and Information Processing (GlobalSIP). IEEE, 2019.
[54] Oliveira, Alexandre T., et al. "SDN-based architecture for providing QoS to high performance distributed applications." 2018 IEEE Symposium on Computers and Communications (ISCC). IEEE, 2018.
[55] Bi, Yuanguo, et al. "Intelligent QoS-aware Traffic Forwarding for SDN/OSPF Hybrid Industrial Internet." IEEE Transactions on Industrial Informatics (2019).
[56] VideoLAN, “Official download of VLC media player, the best Open Source player - VideoLAN”, 2020. Accessed on: April 23, 2020. [Online]. Available: https://www.videolan.org/vlc/
[57] Wikipedia, “pcap”, 2020, Accessed on: April 23, 2020. [Online]. Available: https://en.wikipedia.org/wiki/Pcap
[58] libpcap, “the-tcpdump-group/libpcap: the LIBpcap interface to various kernel packet capture mechanism”, 2020, Accessed on April 23, 2020. [Online]. Available: https://github.com/the-tcpdump-group/libpcap
[59] Riverbed Technology, “WinPcap – Home”, 2018, Accessed on: April 23, 2020 [Online]. Available: https://www.winpcap.org/
[60] nmap, “Npcap: Windows Packet Capture Library & Driver”, 2019, Accessed on: April 23, 2020 [Online]. Available: https://nmap.org/npcap/
[61] Wireshark, “Wireshark · Go Deep.”, 2020, Accessed on: April 23, 2020. [Online]. Available: https://www.wireshark.org/
[62] Prabhav Jain, “Feature Scaling | CommonLounge”, 2019. Accessed on: April 11, 2020 [Online]. Available: https://www.commonlounge.com/discussion/232c0df22e884e119eb1518f4c23372e/history
[63] Linux Foundation, “Open vSwitch”, 2020. Accessed on: April 24, 2020. [Online]. Available: https://www.openvswitch.org/
[64] Congdon, Paul. "Link layer discovery protocol and MIB." V1. 0 May 20.2002 (2002): 1-20.
[65] Zimmermann, Hubert. "OSI reference model-the ISO model of architecture for open systems interconnection." IEEE Transactions on communications 28.4 (1980): 425-432.
[66] Azzouni, Abdelhadi, et al. "Limitations of OpenFlow topology discovery protocol." 2017 16th Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net). IEEE, 2017.
[67] Phemius, Kevin, and Mathieu Bouet. "Monitoring latency with openflow." Proceedings of the 9th International Conference on Network and Service Management (CNSM 2013). IEEE, 2013.
[68] Kingma, Diederik P., and Jimmy Ba. "Adam: A method for stochastic optimization." arXiv preprint arXiv:1412.6980 (2014).
[69] NVIDIA Corporation, “CUDA Toolkit”, 2020, May 7, 2020. [Online]. Available: https://developer.nvidia.com/cuda-toolkit
[70] NVIDIA Corporation, “cuDNN Download”, 2020, May 7, 2020. [Online]. Available: https://developer.nvidia.com/rdp/cudnn-download
[71] Abadi, Martín, et al. "Tensorflow: Large-scale machine learning on heterogeneous distributed systems." arXiv preprint arXiv:1603.04467 (2016).
[72] Fred Klassen, and AppNeta, “tcprewrite”, 2018, Accessed on May 7, 2020. [Online]. Available: https://tcpreplay.appneta.com/wiki/tcprewrite-man.html
[73] Ryu SDN Framework Community, “Ryu SDN Framework”, 2017, Accessed on May 7, 2020. [Online]. Available: https://osrg.github.io/ryu/
[74] Mininet org., “Mininet, An Instant Virtual Network on your Laptop (or other PC)”, 2018, Accessed on May 7, 2020 [Online]. Available: http://mininet.org/
[75] Addy Yeow Chin Heng, “Bit-Twist Libpcap-based Ethernet packet generator”, 2012, Accessed on: May 7, 2020. [Online]. Available: http://bittwist.sourceforge.net/
[76] Fred Klassen, and AppNeta, “tcpreplay”, 2018, Accessed on May 7, 2020. [Online]. Available: https://tcpreplay.appneta.com/wiki/tcpreplay-man.html
[77] A. H. Lashkari, G. Draper-Gil, M. S. I. Mamun, and A. A. Ghorbani, ‘‘Characterization of encrypted and VPN traffic using time-related features,’’ in Proc. Int. Conf. Inf. Syst. Secur. Privacy (ICISSP), Feb. 2016, pp. 407–414.
[78] Jon Dugan, et al. “iPerf - The ultimate speed test tool for TCP, UDP and SCTP,” 2013, Accessed on: May 12, 2020. [Online]. Available: https://iperf.fr/ |