نتایج جستجو برای: network traffic identification
تعداد نتایج: 1117736 فیلتر نتایج به سال:
اندازه گیری و نظارت ترافیک پایه و اساس محدوده وسیعی از فعالیتهای شبکه های ip شامل مدیریت شبکه، فعالیتهای مهندسی شبکه مانند رفع اشکال، حسابرسی ، سابقه نمای مصرف ، پیکربندی وزنهای مسیر یابی، تعدیل بار، تخمین ظرفیت مورد نیاز و ... است.علاوه بر اطلاعات ترافیک در سطح بسته، آمارهای ترافیک در سطح جریان نیز اطلاعات ارزشمندی در ارتباط با رفتار های منابع ترافیکی در اختیار ما می گذارند. از مزیتهای بررسی ت...
Traffic congestion is a major urban transportation problem which occurs when the traffic volume exceeds the capacity of existing road facilities. The occurring of traffic congestion is due to the freedom of owning private vehicle, poor traffic facility and unrestricted urban population growth. In this study, identification of maximum flow and bottleneck path in Kota Kinabalu, Sabah, Malaysia wa...
For ATM network traffic, a new approach based on the Kullback-Leibler information measure is proposed for stochastic system identification of packet traffic. Thus approach, equivalent to the maximum marginal likelihood estimate, can overcome the over-modeling problem in [II such that much more parsimonious model order N can be obtained, and then can lead significant reduction in the latter queu...
This paper studies the load reduction potential of a prototyped “smart” rotor. This is, a rotor where the blades are equipped with a number of control devices that locally change the lift profile on the blade, combined with appropriate sensors and controllers. Experimental models, using dedicated system identification techniques, are developed of a scaled rotating two-bladed “smart” rotor of wh...
The number and variety of IP applications have hugely increased in the last few years. Among them, peer-to-peer (P2P) file-sharing applications have become very popular: more users are continuously joining such systems and more objects are being made available, seducing even more users to join. An accurate mapping of traffic to applications is important for a wide range of network management ta...
Abstract— Bot networks are a serious threat to cyber security, whose destructive behavior affects network performance directly. Detecting of infected HTTP communications is a big challenge because infected HTTP connections are clearly merged with other types of HTTP traffic. Cybercriminals prefer to use the web as a communication environment to launch application layer attacks and secretly enga...
This paper focuses on the sampling-based Deep Packet Inspection for the traffic of P2P file sharing systems, especially for BitTorrent, and proposes a logarithmic-based Adaptive Trust Sampling (ATS) strategy for P2P traffic identification. In the whole process of sampling identification for P2P traffic, the sampling ratio of the current node in a P2P network can automatically adjust and dynamic...
Recently, Peer-to-peer (P2P) networks have been widely applied in streaming media, instant messaging, file sharing and other fields, which have occupied more and more network bandwidth. Accurately identify P2P traffic is very important to management and control P2P traffic. In this paper, we introduce HFBP, a novel P2P identification scheme based on the host level and flow level behavior profil...
With the commercialization of fifth-generation (5G), rapid popularity mobile Over-The-Top (OTT) voice applications brings huge impacts on traditional telecommunication call services. Tunnel encryption technology such as Virtual Private Networks (VPNs) allow OTT users to escape supervision network operators easily, which may cause potential security risks cyberspace. To monitor harmful in contex...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید