1. AZZOUNA N B, GUILLEMIN F. Impact of peer-to-peer applications on wide area network traffic [C]// Proc of IEEE Global Telecommunications Conference. Texas: IEEE, 2004: 1544–1548.
2. KIM J T, PARK H K, PAIK E H. Security issues in peer-to-peer systems [C]// The 7th International Conference on Advanced Communications Technology. Phoenix Park: IEEE, 2005: 1059–1063. 1063.
3. SEN S, WANG J. Analyzing peer-to-peer traffic across large networks [J]. IEEE Trans on Networking, 2004, 2(2): 219–231.
4. SEN S, SPATSCHECK O, WANG Dong-mei. Accurate, scalable in-network identification of P2P traffic using application signatures [C]// Proceedings of ACM www′04. New York: ACM, 2004: 512–521.
5. ERMAN J, MAHANTI A, ARLITT M, COHEN I, WILLIAMSON C. Semi-supervised network traffic classification [C]// Proceedings of the ACM SIGMETRICS, New York: ACM, 2007: 369–370.