{"id":"https://openalex.org/W2538510963","doi":"https://doi.org/10.1109/ccis.2012.6664225","title":"The identification for P2P Thunder traffic based on deep flow identification","display_name":"The identification for P2P Thunder traffic based on deep flow identification","publication_year":2012,"publication_date":"2012-10-01","ids":{"openalex":"https://openalex.org/W2538510963","doi":"https://doi.org/10.1109/ccis.2012.6664225","mag":"2538510963"},"language":"en","primary_location":{"id":"doi:10.1109/ccis.2012.6664225","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccis.2012.6664225","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100454052","display_name":"Jie Liu","orcid":"https://orcid.org/0000-0002-0750-1030"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jie Liu","raw_affiliation_strings":["Beijing Key Laboratory of Network System Architecture and Convergence, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of Network System Architecture and Convergence, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100453096","display_name":"Fang Liu","orcid":"https://orcid.org/0000-0002-9635-5900"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fang Liu","raw_affiliation_strings":["Beijing Key Laboratory of Network System Architecture and Convergence, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of Network System Architecture and Convergence, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5089941053","display_name":"Dazhong He","orcid":"https://orcid.org/0000-0002-1895-0122"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dazhong He","raw_affiliation_strings":["Beijing Key Laboratory of Network System Architecture and Convergence, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of Network System Architecture and Convergence, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100454052"],"corresponding_institution_ids":["https://openalex.org/I139759216"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.30823398,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"26","issue":null,"first_page":"504","last_page":"507"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9854000210762024,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7127770185470581},{"id":"https://openalex.org/keywords/network-traffic-control","display_name":"Network traffic control","score":0.6903036832809448},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.6269392967224121},{"id":"https://openalex.org/keywords/traffic-generation-model","display_name":"Traffic generation model","score":0.6130252480506897},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5992224812507629},{"id":"https://openalex.org/keywords/traffic-shaping","display_name":"Traffic shaping","score":0.5518251657485962},{"id":"https://openalex.org/keywords/network-traffic-simulation","display_name":"Network traffic simulation","score":0.5274118185043335},{"id":"https://openalex.org/keywords/thunder","display_name":"Thunder","score":0.5078566670417786},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4837479591369629},{"id":"https://openalex.org/keywords/popularity","display_name":"Popularity","score":0.4794653654098511},{"id":"https://openalex.org/keywords/internet-traffic","display_name":"Internet traffic","score":0.4534284770488739},{"id":"https://openalex.org/keywords/download","display_name":"Download","score":0.450035035610199},{"id":"https://openalex.org/keywords/floating-car-data","display_name":"Floating car data","score":0.4200275242328644},{"id":"https://openalex.org/keywords/flow-network","display_name":"Flow network","score":0.41942405700683594},{"id":"https://openalex.org/keywords/traffic-flow","display_name":"Traffic flow (computer networking)","score":0.412697970867157},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3289657235145569},{"id":"https://openalex.org/keywords/traffic-congestion","display_name":"Traffic congestion","score":0.23244574666023254},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1974509358406067},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.14104625582695007},{"id":"https://openalex.org/keywords/transport-engineering","display_name":"Transport engineering","score":0.08871486783027649}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7127770185470581},{"id":"https://openalex.org/C201100257","wikidata":"https://www.wikidata.org/wiki/Q393287","display_name":"Network traffic control","level":3,"score":0.6903036832809448},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.6269392967224121},{"id":"https://openalex.org/C176715033","wikidata":"https://www.wikidata.org/wiki/Q2080768","display_name":"Traffic generation model","level":2,"score":0.6130252480506897},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5992224812507629},{"id":"https://openalex.org/C46451311","wikidata":"https://www.wikidata.org/wiki/Q262550","display_name":"Traffic shaping","level":4,"score":0.5518251657485962},{"id":"https://openalex.org/C94168897","wikidata":"https://www.wikidata.org/wiki/Q574324","display_name":"Network traffic simulation","level":4,"score":0.5274118185043335},{"id":"https://openalex.org/C206554765","wikidata":"https://www.wikidata.org/wiki/Q83301","display_name":"Thunder","level":2,"score":0.5078566670417786},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4837479591369629},{"id":"https://openalex.org/C2780586970","wikidata":"https://www.wikidata.org/wiki/Q1357284","display_name":"Popularity","level":2,"score":0.4794653654098511},{"id":"https://openalex.org/C63969886","wikidata":"https://www.wikidata.org/wiki/Q3536440","display_name":"Internet traffic","level":3,"score":0.4534284770488739},{"id":"https://openalex.org/C2780154274","wikidata":"https://www.wikidata.org/wiki/Q7126717","display_name":"Download","level":2,"score":0.450035035610199},{"id":"https://openalex.org/C64093975","wikidata":"https://www.wikidata.org/wiki/Q356677","display_name":"Floating car data","level":3,"score":0.4200275242328644},{"id":"https://openalex.org/C114809511","wikidata":"https://www.wikidata.org/wiki/Q1412924","display_name":"Flow network","level":2,"score":0.41942405700683594},{"id":"https://openalex.org/C207512268","wikidata":"https://www.wikidata.org/wiki/Q3074551","display_name":"Traffic flow (computer networking)","level":2,"score":0.412697970867157},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3289657235145569},{"id":"https://openalex.org/C2779888511","wikidata":"https://www.wikidata.org/wiki/Q244156","display_name":"Traffic congestion","level":2,"score":0.23244574666023254},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1974509358406067},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.14104625582695007},{"id":"https://openalex.org/C22212356","wikidata":"https://www.wikidata.org/wiki/Q775325","display_name":"Transport engineering","level":1,"score":0.08871486783027649},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ccis.2012.6664225","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccis.2012.6664225","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W1981423980","https://openalex.org/W2074581981","https://openalex.org/W2090115132","https://openalex.org/W2159778089","https://openalex.org/W2351374781","https://openalex.org/W2536399632","https://openalex.org/W7002210088"],"related_works":["https://openalex.org/W2138225277","https://openalex.org/W2612238703","https://openalex.org/W2490010379","https://openalex.org/W2147668000","https://openalex.org/W2374980776","https://openalex.org/W2392451399","https://openalex.org/W2352713638","https://openalex.org/W4242927786","https://openalex.org/W2748549804","https://openalex.org/W1998539287"],"abstract_inverted_index":{"Network":[0,26],"traffic":[1,10,22,27,110,123],"analysis":[2,28],"and":[3,23,29,46,72,78,112,127],"identification":[4,30],"play":[5],"important":[6,63],"roles":[7],"in":[8,135],"network":[9,13,21,24,36,49,109],"monitoring.":[11],"The":[12],"applications":[14,95],"are":[15],"the":[16,32,48,52,61,66,83,91,103,106,115,121,129,132,136],"root":[17],"causes":[18],"to":[19,44],"generate":[20],"behavior.":[25],"is":[31,76,138],"basis":[33,43],"of":[34,54,60,65,82,90,105],"other":[35],"problems,":[37],"which":[38],"provides":[39],"ISP":[40],"an":[41],"effective":[42],"control":[45],"distinguish":[47],"traffic.":[50],"With":[51],"popularity":[53],"Internet,":[55],"\"download\"":[56],"has":[57],"become":[58],"one":[59,89],"most":[62,92],"parts":[64],"domestic":[67],"Internet":[68],"users.":[69],"As":[70],"more":[71,73,77,79],"resources,":[74],"there":[75],"enthusiastic":[80],"discussion":[81],"download":[84,94],"tools.":[85],"This":[86],"paper":[87],"takes":[88],"popular":[93],"Thunder":[96,122],"(also":[97],"called":[98],"Xunlei)":[99],"for":[100],"example,":[101],"indicating":[102],"significance":[104],"flow-based":[107],"statistical":[108],"classification":[111],"identification.":[113],"Through":[114],"characteristics":[116],"extraction,":[117],"we":[118],"can":[119],"identify":[120],"with":[124],"high":[125],"accuracy,":[126],"at":[128],"same":[130],"time,":[131],"time":[133],"cost":[134],"experiment":[137],"reduced":[139],"a":[140],"lot.":[141]},"counts_by_year":[{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
