• No results found

Network traffic classification

Self Learning Network Traffic Classification

Self Learning Network Traffic Classification

... Learning Network Traffic Classification is a semi-automated Internet flow traffic classifier which leverages unsupervised clustering algorithms to automatically group’s flows into ...Learning ...

11

A Survey on Analysis of Service Usage of Application using Multistage Classifier for Network Traffic Classification

A Survey on Analysis of Service Usage of Application using Multistage Classifier for Network Traffic Classification

... for network traffic classification with the help of which a service usage is ...internet traffic classification, which has imposed some performance ...patterns, network ...

5

Improved Network Traffic Classification Using Ensemble Learning

Improved Network Traffic Classification Using Ensemble Learning

... Ensemble learning includes a wide range of research efforts that seek to find the best methods to build combinations of classifiers [6]. Works such as [7] and [8] started to investigate meta-learning techniques in the ...

6

An Enhanced Technique for Network Traffic Classification with unknown Flow Detection

An Enhanced Technique for Network Traffic Classification with unknown Flow Detection

... sensor network (WSN) is a computer network consisting of spatially distributed autonomous devices using sensors to cooperatively monitor physical or environmental conditions, such as temperature, sound, ...

6

Machine Learning Approach for the Network Traffic Classification

Machine Learning Approach for the Network Traffic Classification

... The network traffic classification method is performed to categorize the traffic against malicious or ...the network using proposed methodology, three important steps are ...of ...

5

Title: A NEW HYBRID APPROACH FOR NETWORK TRAFFIC CLASSIFICATION USING SVM AND NAÏVE BAYES ALGORITHM

Title: A NEW HYBRID APPROACH FOR NETWORK TRAFFIC CLASSIFICATION USING SVM AND NAÏVE BAYES ALGORITHM

... Internet traffic classification is the process of identifying network applications and classifying the corresponding traffic, which is considered to be the most fundamental functionality in ...

7

A Big Data Approach for Traffic Classification using Data Mining

A Big Data Approach for Traffic Classification using Data Mining

... the classification of network ...achieve network traffic classification, some steps has to be performed, and this knowledge discovery is performed using network data of college ...

7

A Traffic Minimization Approach for Big Data in Map Reduce Job by Intermediate Data Partition Technique

A Traffic Minimization Approach for Big Data in Map Reduce Job by Intermediate Data Partition Technique

... overall network traffic byData partition and aggregation for a MapReduce job as shownin ...reduce network traffic price inboth offline and on-line ...The network trafficminimization ...

7

Index Terms:- Mobile Phone Network, Traffic Congestion, Urban Traffic Network.

Index Terms:- Mobile Phone Network, Traffic Congestion, Urban Traffic Network.

... urban traffic network, which constitutes urban roads, peoples and ...urban traffic manager is to manage and control the movement of the traffic users without ...Phone Network, which ...

6

A Mobile Wi-Fi Access Point Considering Types and Volumes of Traffic

A Mobile Wi-Fi Access Point Considering Types and Volumes of Traffic

... In the experiment method, each terminal is first connected to the AP to be evaluated, and traffic is generated. On the AP side, traffic from each terminal is monitored and communication throughput is ...

5

Integration of SDN and 5G and Its Related Challenges and Security Issues

Integration of SDN and 5G and Its Related Challenges and Security Issues

... 5G network, as well as network bandwidth and latency can be minimized ...manage network redundancy as well as circumnavigating major outages by determining optimal data flows in real time from the ...

7

DDoS Attacks Impact on Network Traffic and its Detection Approach

DDoS Attacks Impact on Network Traffic and its Detection Approach

... attack network and launching of attacks, started appearing in 1998), there are a multitude of denial of service attacks that have been ...of traffic at and near the target machine, clogging all the routes ...

5

Design and simulation of wireless network for Anomaly detection and prevention in network traffic with various approaches

Design and simulation of wireless network for Anomaly detection and prevention in network traffic with various approaches

... the traffic at dissimilar time scales this approach is able to report short and long lasting ...whole traffic is collective into a single signal analyze the detected anomalies is challenging and anomalous ...

9

Applying classification techniques for network intrusion detection

Applying classification techniques for network intrusion detection

... anomaly network intrusion detection system implemented based on using genetic algorithm, meta-heuristic method and clustering ...of network connections is ...

5

Reliability Analysis of Network Based on the Traffic Correlation

Reliability Analysis of Network Based on the Traffic Correlation

... complex network reliability has become one of the hot and difficult issues at home and ...of network reliability indicators can be summarized as the following three indicators: Invulnerability, ...

6

A network game of dynamic traffic

A network game of dynamic traffic

... Bounded queue lengths. Since there may be infinitely many agents in dynamic routing models like ours, a natural question is whether the queue length at each edge at equilibria can be bounded by a constant that depends ...

37

INFORMATION TECHNOLOGY FOR NUMERICAL SIMULATION OF CONVECTIVE FLOWS OF A VISCOUS 
INCOMPRESSIBLE FLUID IN CURVILINEAR MULTIPLY CONNECTED DOMAINS

INFORMATION TECHNOLOGY FOR NUMERICAL SIMULATION OF CONVECTIVE FLOWS OF A VISCOUS INCOMPRESSIBLE FLUID IN CURVILINEAR MULTIPLY CONNECTED DOMAINS

... neural network models are machine learning frameworks that attempt to mimic the learning pattern of natural biological neural ...neural network model as a powerful learning tools employed in a wide range of ...

17

PERFORMANCE ANALYSIS OF WLAN UNDER VARIABLE NUMBER OF NODES USING THE ADJUSTABLE 
PARAMETERS IN EDCA

PERFORMANCE ANALYSIS OF WLAN UNDER VARIABLE NUMBER OF NODES USING THE ADJUSTABLE PARAMETERS IN EDCA

... the network using open source tools and detecting MAC address spoofing and in our work we try to propose a method to detect active attacks using discrimination ...

8

3G Handset And Network Design pdf

3G Handset And Network Design pdf

... As a rule of thumb, you can say that adding multimedia/rich media functionality to a handset easily doubles the power consumption—even before you take into account the additional RF power budget needed to send and ...

561

Improving the Nodule Lifespan and Security Using IDS in WSN

Improving the Nodule Lifespan and Security Using IDS in WSN

... Probability based strategies: A. Boukerche et.al [8] based on the probability of interest routing path selection with a target to balance energy consumption and enhance the network lifetime.They have considered ...

9

Show all 10000 documents...

Related subjects