1. Besikas C, Mantar H A, Real-Time traffic classification based on cosine similarity using sub-application vectors, Traffic Monitoringamd Analysis, Springer Berlin Heidelberg, 2012, pp.89-92.
2. Fan Chen, DawuGu. Reverse analysis software FreeGate, The twenty-third National Computer Security Symposium, (2008).
3. Information on http: /iptables- tutorial. frozentux. net/iptables-tutorial. html.
4. Sharpe Richard, Warnicke Ed, and Lamping Ulf, Ethereal User's Guide V2. 00 for Ethereal 0. 10. 5. http: /www. rootsecure. net/ content/downloads/pdf/ethereal_guide. pdf, (2004).
5. Feitian, Software encryption principle and Application. Beijing: Publishing House of electronics industry, (2004).