A. Madhukar and C. Williamson, “A longitudinal study of P2P traffic classification,” in 14th IEEE International Symposium on Modeling, Analysis,and Simulation of Computer and Telecommunication Systems, 2006.
 A. Callado and et al., “A survey on internet traffic identification,” Communications Surveys & Tutorials IEEE, vol. 11, pp. 37-52, 2009.
 T. Nguyen and G. Armitage, “A survey of techniques for internet traffic classification using machine learning,” Communications Surveys & Tutorials,IEEE, vol. 10, pp. 56-76, 2008.
 A. Dainotti, A. Pescape and K. C. Claffy, “Issues and future directions in traffic classification,” IEEE Network, vol. 26, no. 1, pp. 35-40, 2012.
 A. W. Moore and D. Zuev, “Internet Traffic Classification Using Bayesian Analysis Techniques,”
SIGMETRICS Perform. Eval. Rev., vol. 33, no.1, pp. 50-60, 2005.
 R. Alshammari and A. N. Zincir-Heywood, “Can encrypted traffic be identified without port numbers,
IP addresses and payload inspection?,”Computer networks, vol. 55, pp. 1326-1350, 2011.
 C. Zigang, C. Shoufeng, X. Gang and G. Li,“Progress in Study of Encrypted Traffic Classification,”
in Trustworthy Computing and Services:International Conference, Beijing, 2013.
 Z. Meng, H. Zhang, B. Zhang and G. Lu, “Encrypted Traffic Classification Based on an Improved
Clustering Algorithm,” in Trustworthy Computing and Services: International Conference,Beijing, 2012.
 J. Erman, A. Mahanti, M. Arlitt and L. Cohen,“Offline/realtime traffic classification using semisupervised
learning,” Performance Evaluation,vol. 64, no. 9-12, p. 1194âAS1213, 2007.
 “SSH,” [Online]. Available: http://www.rfcarchive.org/getrfc.php?rfc=4251.
 C. Chao, J. Zhang, Y. Xiang, W. Zhou and Y.Xiang, “Internet traffic classification by aggregating
correlated naive bayes predictions,” IEEE Transactions on Information Forensics and Security,vol. 8, no. 1, pp. 5-15, 2013.
 N. Williams, S. Zander and G. Armitage, “A Preliminary Performance Comparison of Five Machine Learning Algorithms for Practical IP Traffic Flow Classification,” SIGCOMM Comput.Commun. Rev., vol. 36, no. 5, pp. 5-16, 2006.
 H. Kim, K. Claffy, M. Fomenkov, D. Barman, M.Faloutsos and K. Lee, “Internet Traffic Classification
Demystified: Myths, Caveats, and the Best Practices,” in CoNEXT ’08, New York, 2008.
 M. Lotfollahi, R. S. Hossein Zade, M. Jafari Siavoshani and M. Saberian, “Deep Packet: A Novel Approach For Encrypted Traffic Classification Using Deep Learning,” eprint arXiv, vol.1709.02656, no. 2, 2017.
 S. Bagui, X. Fang, K. Ezhil, S. C. Bagui and J.Sheehan, “Comparison of machine-learning algorithms
for classification of VPN network using time-related features,” Journal of Cyber Security Technology, vol. 1, no. 2, pp. 108-126, 2017.
 A. McGregor, M. Hall, P. Lorier and J. Brunskill,“Flow Clustering Using Machine Learning Techniques,” in Passive and Active Network Measurement: 5th International Workshop, Berlin,Heidelberg, Springer Berlin Heidelberg, 2004, pp.205-214.
 L. Bernaille, R. Teixeira and K. Salamatian, “Early Application Identification,” in Proceedings of the 2006 ACM CoNEXT Conference, New York, NY, USA, 2006.
 Z. Jun, X. Yang, Z. Wanlei and W. Yu, “Unsupervised traffic classification using flow statistical properties and IP packet payload,” Journal of Computer and System Sciences, vol. 79, no. 5,pp. 573-585, 2013.
 A. Shrivastav and A. Tiwari, “Network traffic classification using semi-supervised approach,” in Machine Learning and Computing (ICMLC),Bangalore, 2010.
 Y. Wang, Y. Xiang, J. Zhang and S. Yu, “A novel semi-supervised approach for network traffic clustering,” in 5th International Conference on Network and System Security (NSS), Milan,2011.
 C. T. Zahn, “Graph-Theoretical Methods for Detecting and Describing Gestalt Clusters,” IEEE Transactions on Computers, Vols. C-20, no. 1,pp. 68-86, 1971.
 C. Zhong and et al., “A graph-theoretical clustering method based on two rounds of minimum spanning trees,” Pattern Recognition, vol. 43, pp.752-766, 2010.
 “NLANR,” [Online]. Available: http://pma.nlanr.net.
 “MAWI,” [Online]. Available: http://mawi.wide.ad.jp/mawi/.
 “DARPA 1999 intrusion detection evaluation data,” [Online]. Available: https://www.ll.mit.edu/ideval/data/. “BRASIL,” [Online]. Available: