%% You should probably cite draft-conet-aeon-problem-statement instead of this I-D. @techreport{eckel-aeon-problem-statement-00, number = {draft-eckel-aeon-problem-statement-00}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-eckel-aeon-problem-statement/00/}, author = {Charles Eckel and Tirumaleswar Reddy.K}, title = {{Application Enabled Open Networking: Problem Statement and Requirements}}, pagetotal = 6, year = 2014, month = feb, day = 14, abstract = {Identification and treatment of application flows are critical for the successful deployment and operation of applications. Historically, this functionality has been accomplished to the extent possible using heuristics, which inspect and infer flow characteristics. Heuristics may be based on port ranges, network separation, or deep packet inspection (DPI). But many application flows in current usages are dynamic, time-bound (short lived for some of them), possibly encrypted (TLS for signaling), peer-to-peer, possibly asymmetric, and used on non-dedicated devices, any combination of which renders such techniques less effective or results in compromises to application security or user privacy.}, }