As part of a broader organisational restructure, data networking research at Swinburne University of Technology has moved from the Centre for Advanced Internet Architecture (CAIA) to the Internet For Things (I4T) Research Lab.

Although CAIA no longer exists, this website reflects CAIA's activities and outputs between March 2002 and February 2017, and is being maintained as a service to the broader data networking research community.

DSTC - Related Papers and Interim Reports

By members of CAIA

Journal and Conference Papers

Tech Reports and Talks

By the wider community

Machine Learning for Traffic Classification

  • L. Bernaille, R. Teuxeira, I. Akodkenou, A. Soule, K. Salamatian, “Traffic Classification on the Fly”, ACM SIGCOMM Computer Communication Review, vol. 36, no. 2, April 2006.
  • T. Karagiannis, K. Papagiannaki, and M. Faloutsos, “BLINC: Multilevel Traffic Classification in the Dark”, ACM Sigcomm 2005, Philadelphia, PA, USA, August 2005.
  • Denis Zuev, Andrew Moore, "Internet traffic classification using bayesian analysis techniques", ACM SIGMETRICS 2005, Banff, Canada, June, 2005.
  • Denis Zuev, Andrew Moore, “Traffic Classification using a Statistical Approach”, Passive & Active Measurement Workshop, Boston, U.S.A, April 2005.
  • M. Roughan, S. Sen, O. Spatscheck, N. Duffield, “Class-of-Service Mapping for QoS: A statistical signature-based approach to IP traffic classification”, ACM SIGCOMM Internet Measurement Workshop 2004, Taormina, Sicily, Italy, 2004.
  • A. McGregor, M. Hall, P. Lorier, J. Brunskill, “Flow Clustering Using Machine Learning Techniques”, Passive & Active Measurement Workshop 2004 (PAM 2004), France, April 19-20, 2004.
  • James P. Early, Carla E. Brodley, and Catherine Rosenburg, "Behavioral Authentication of Server Flows", Proceedings of the 19th Annual Computer Security Applications Conference, Las Vegas, NV, USA, December 2003.
  • A. Soule, K. Salamatian, N. Taft, R. Emilion, and K. Papagiannaki, “Flow Classification by Histograms or How to Go on Safari in the Internet”, In ACM Sigmetrics, New York, U.S.A., June, 2004.
  • T. Dunnigan, G. Ostrouchov, “Flow Characterization for Intrusion Detection”, Oak Ridge National Laboratory, Technical Report, November 2000.

Traffic Measurement and Classification

  • A. Moore, and K. Papagiannaki, “Toward the Accurate Identification of Network Applications”, to appear in Passive & Active Measurement Workshop, Boston, U.S.A., April, 2005.
  • Cisco IOS Documentation, “Network-Based Application Recognition and Distributed Network-Based Application Recognition“, (as of February 2005).
  • Thomas Karagiannis, Andre Broido, Nevil Brownlee, kc claffy, “Is P2P dying or just hiding?”, Proceedings of Globecom 2004, November/December 2004.
  • S. Sen, O. Spatscheck, D. Wang, “Accurate, Scalable In­Network Identification of P2P Traffic Using Application Signatures”, WWW 2004, New York, USA, May 2004.
  • K. Lan, J. Heidemann, “On the correlation of Internet flow characteristics”, Technical Report ISI-TR-574, USC/Information Sciences Institute, July, 2003.
  • S. McCreary and k. claffy, “Trends in wide area IP traffic patterns - A view from Ames Internet Exchange'', in ITC Specialist Seminar, Monterey, CA, 18-20 Sep 2000.

Machine Learning Techniques and Algorithms

  • Ian H. Witten, Eibe Frank,  "Data Mining: Practical Machine Learning Tools and Techniques (Second Edition)", Morgan Kaufmann, June 2005.
  • Tom M. Mitchell, “Machine Learning”, McGraw-Hill Education (ISE Editions), December 1997.
  • Tom M. Mitchell, “Does Machine Learning Really Work?”, AI Magazine 18(3), pp. 11-20, 1997.
  • T. G. Dietterich, “Machine-Learning Research – Four Current Directions”, American Association for Artificial Intelligence, 1997.


Last Updated: Wednesday 7-Dec-2016 11:19:55 AEDT | Maintained by: Sebastian Zander ( | Authorised by: Grenville Armitage (