Filters








34 Hits in 3.2 sec

Network Traffic Modeling Using a Multifractal Wavelet Model [chapter]

Rudolf H. Riedi, Vinay J. Ribeiro, Matthew S. Crouse, Richard G. Baraniuk
2001 European Congress of Mathematics  
In this paper, we develop a simple and powerful multiscale model for synthesizing nonGaussian, long-range dependent (LRD) network traffic.  ...  Using a multiplicative superstructure on top of the Haar wavelet transform, we exploit the decorrelating properties of wavelets while simultaneously capturing the positivity and "spikiness" of nonGaussian  ...  Real network traffic traces, however, do not exhibit the strict self-similarity of (1) and are positive and nonGaussian in nature thus limiting the use of fBm as a traffic model.  ... 
doi:10.1007/978-3-0348-8266-8_54 fatcat:i5exgaghajhghlpd43semologe

Non-Gaussian and Long Memory Statistical Characterizations for Internet Traffic with Anomalies

Antoine Scherrer, Nicolas Larrieu, Philippe Owezarski, Pierre Borgnat, Patrice Abry
2007 IEEE Transactions on Dependable and Secure Computing  
First, we propose the use of a non-Gaussian long-range dependent process to model Internet traffic aggregated time series. We give the definitions and intuition behind the use of this model.  ...  We show that this empirical model relevantly describes a large variety of Internet traffic, including both regular traffic obtained from public reference repositories and traffic containing legitimate  ...  They also gratefully acknowledge colleagues from the major Internet traces repositories for making their data available to us or for having performed the preformatting of some of the time series used here  ... 
doi:10.1109/tdsc.2007.12 fatcat:oe6b4ewqvnh6vp56ooz6stjib4

Dynamic Modeling of Internet Traffic for Intrusion Detection

Khushboo Shah, Edmond Jonckheere, Stephan Bohacek
2006 EURASIP Journal on Advances in Signal Processing  
Computer network traffic is analyzed via state space models and statistical techniques such as linear and nonlinear canonical correlation analyses and mutual information.  ...  As an application, the models and the statistical techniques are utilized to detect UDP flooding attacks.  ...  Figure 3 : 3 Link utilization time-series for non-attack data for dumbbell at sampling period 0.01 sec. topology.  ... 
doi:10.1155/2007/90312 fatcat:cgvycjzekrdohf7e7gjjyhtnsu

Dynamic modeling of Internet traffic for intrusion detection

E. Jonckheere, K. Shah, S. Bohacek
2002 Proceedings of the 2002 American Control Conference (IEEE Cat. No.CH37301)  
Computer network traffic is analyzed via state space models and statistical techniques such as linear and nonlinear canonical correlation analyses and mutual information.  ...  As an application, the models and the statistical techniques are utilized to detect UDP flooding attacks.  ...  Figure 3 : 3 Link utilization time-series for non-attack data for dumbbell at sampling period 0.01 sec. topology.  ... 
doi:10.1109/acc.2002.1024008 fatcat:t6yvx6lzpnhttmshtteaia5xle

Unmixing Mix Traffic [chapter]

Ye Zhu, Riccardo Bettati
2006 Lecture Notes in Computer Science  
By correlating separated groups of flows across nodes, a passive attacker can get an accurate traffic map of the mix network. We use a non-trivial network to show that the combined attack works.  ...  The experiments also show that multicast traffic can be dangerous for anonymity networks.  ...  Figure 3 (a) shows portions of the actual time series and of 3(b) of the estimated time series.  ... 
doi:10.1007/11767831_8 fatcat:vfubvdc57rdftkqvxvfqsad23y

Traffic matrix estimation

A. Medina, N. Taft, K. Salamatian, S. Bhattacharyya, C. Diot
2002 Computer communication review  
Very few techniques have been proposed for estimating traffic matrices in the context of Internet traffic. Our work on POP-to-POP traffic matrices (TM) makes two contributions.  ...  We validate this approach by illustrating that our modeling assumption matches actual Internet data well.  ...  Therefore, we may think of the geographic spread of Internet traffic as resulting from a 2-level decision process that is taking place in the network at all times.  ... 
doi:10.1145/964725.633041 fatcat:qrsr75aw4bfdpiurob4xgkvh3u

Compromising anonymous communication systems using blind source separation

Ye Zhu, Riccardo Bettati
2009 ACM Transactions on Privacy and Security  
Based on time series of counts of anonymous packets provided by the sensors, we estimate the number of nodes with the use of Principal Component Analysis.  ...  Given these limited required capabilities, we use the sensors to count packets over intervals of given length, and to forward the resulting time series of packet counts for analysis to some central location  ...  Low-latency anonymity systems have been developed for flow-based traffic in the Internet.  ... 
doi:10.1145/1609956.1609964 fatcat:yd2l6qwjuvh7jjjhrseu3vcsum

Community sense and response systems

Matthew Faulkner, MingHei Cheng, Andreas Krause, Robert Clayton, Thomas Heaton, K. Mani Chandy, Monica Kohler, Julian Bunn, Richard Guy, Annie Liu, Michael Olson
2014 Communications of the ACM  
Once the acceleration time series has been oriented with respect to gravity, the time series is cut into short segments that will ultimately be used to compute feature vectors.  ...  probabilities to produce a time series of pick messages.  ... 
doi:10.1145/2622633 fatcat:zexy7ku2qrej5b3bhq65vgbvva

Association of Moving Objects Across Visual Sensor Networks

Muhammad J. Mirza, Nadeem Anjum
2012 Journal of Multimedia  
Since BCS uses AP for clustering, it achieves lower time cost than the generative topic models.  ...  This operation is repeated for each frame in the video sequence and results in a time series of spatial information values.  ...  Service ontology mapping mechanism is analyzed in detail and semantic model is built with the study of the correlation across the geometry modeling service.  ... 
doi:10.4304/jmm.7.1.2-8 fatcat:4cc7sala7ffixohi3ccvothajm

Multivariate Wavelet Whittle Estimation in Long-range Dependence

Sophie Achard, Irène Gannaz
2015 Journal of Time Series Analysis  
This matrix characterizes coupling between time series.  ...  For real data applications, the correlation between time series is crucial.  ...  In many real data applications such as geosciences, internet traffic or neurosciences, the number of time series is huge, as the real data example of Section 6 illustrates.  ... 
doi:10.1111/jtsa.12170 fatcat:mwc4s226gbgdvjbu3agk3whs5a

Generation of Self-Similar Gaussian Time Series by Means of the DWT and DWPT Variance Maps

Isabelle Reis Lund, Jose Roberto de Almeida Amazonas
2010 IEEE Latin America Transactions  
Due to the several kinds of services that use the Internet and data networks infra-structures, the present networks are characterized by the diversity of types of traffic that have statistical properties  ...  The developed methods are extremely flexible and allow the generation of Gaussian time series with complex statistical behaviors.  ...  Também deverá ser ampliado para a geração de séries MWM (Multifractal Wavelet Model), importante em ambiente de redes locais, e séries com distribuições não gaussianas, por exemplo distribuições α-estáveis  ... 
doi:10.1109/tla.2010.5623512 fatcat:rvhfx77have3jki6s6yuthjjym

Multivariate wavelet Whittle estimation in long-range dependence [article]

Sophie Achard, Irène Gannaz
2015 arXiv   pre-print
This matrix characterizes coupling between time series.  ...  For real data applications, the correlation between time series is crucial.  ...  In many real data applications such as geosciences, internet traffic or neurosciences, the number of time series is huge, as the real data example of Section 6 illustrates.  ... 
arXiv:1412.0391v2 fatcat:tzqmqu47ojdmlhyjghwmhswjvm

2006 Index

2006 IEEE Transactions on Automatic Control  
Rosberg, Z., T- AC May 06 862-867 time-varying wireless channel under heavy-traffic approx., optimal power allocation.  ...  Ferrari-Trecate, G., + , T-AC Jun 06 1058-1063 lin. neutral time-delay systs., stabil. Peilin Fu, + , T-AC Jun 06 1063-1069 multivariate stoch. systs., nonGaussian noises, min. entropy filtering.  ... 
doi:10.1109/tac.2006.888976 fatcat:xizizvsq4bbprpliu3ebszwjzu

Intelligent Radio Signal Processing: A Survey [article]

Quoc-Viet Pham and Nhan Thanh Nguyen and Thien Huynh-The and Long Bao Le and Kyungchun Lee and Won-Joo Hwang
2021 arXiv   pre-print
Owing to recent advancements in big data and computing technologies, artificial intelligence (AI) has become a useful tool for radio signal processing and has enabled the realization of intelligent radio  ...  [25] reviewed the adoption of AI for network traffic control systems. The use of machine learning (ML) techniques for designing traffic classification strategies was studied [26] .  ...  In particular, the use of AI for Internet of Things (IoT) applications and massive connectivity, privacy, and security was reviewed [20] , [21] . Gu et al.  ... 
arXiv:2008.08264v3 fatcat:4wmxyio6ejfvbfnqodq5z426m4

Intelligent Radio Signal Processing: A Survey

Quoc-Viet Pham, Nhan Thanh Nguyen, Thien Huynh-The, Long Bao Le, Kyungchun Lee, Won-Joo Hwang
2021 IEEE Access  
Owing to recent advancements in big data and computing technologies, artificial intelligence (AI) has become a useful tool for radio signal processing and has enabled the realization of intelligent radio  ...  [25] reviewed the adoption of AI for network traffic control systems. The use of machine learning (ML) techniques for designing traffic classification strategies was studied [26] .  ...  In particular, the use of AI for Internet of Things (IoT) applications and massive connectivity, privacy, and security was reviewed [20] , [21] . Gu et al.  ... 
doi:10.1109/access.2021.3087136 fatcat:lovomskphvecbnxmvbm4dadssi
« Previous Showing results 1 — 15 out of 34 results