نتایج جستجو برای: network traffic identification

تعداد نتایج: 1117736  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه صنعتی امیرکبیر(پلی تکنیک تهران) - دانشکده مهندسی کامپیوتر 1385

اندازه گیری و نظارت ترافیک پایه و اساس محدوده وسیعی از فعالیتهای شبکه های ip شامل مدیریت شبکه، فعالیتهای مهندسی شبکه مانند رفع اشکال، حسابرسی ، سابقه نمای مصرف ، پیکربندی وزنهای مسیر یابی، تعدیل بار، تخمین ظرفیت مورد نیاز و ... است.علاوه بر اطلاعات ترافیک در سطح بسته، آمارهای ترافیک در سطح جریان نیز اطلاعات ارزشمندی در ارتباط با رفتار های منابع ترافیکی در اختیار ما می گذارند. از مزیتهای بررسی ت...

2017
Noraini Abdullah Ting Kien Hua

Traffic congestion is a major urban transportation problem which occurs when the traffic volume exceeds the capacity of existing road facilities. The occurring of traffic congestion is due to the freedom of owning private vehicle, poor traffic facility and unrestricted urban population growth. In this study, identification of maximum flow and bottleneck path in Kota Kinabalu, Sabah, Malaysia wa...

1999
Baibing Li Bart De Moor

For ATM network traffic, a new approach based on the Kullback-Leibler information measure is proposed for stochastic system identification of packet traffic. Thus approach, equivalent to the maximum marginal likelihood estimate, can overcome the over-modeling problem in [II such that much more parsimonious model order N can be obtained, and then can lead significant reduction in the latter queu...

Journal: :IEEE Trans. Contr. Sys. Techn. 2011
Jan-Willem van Wingerden Anton Hulskamp Thanasis Barlas Ivo Houtzager Harald Bersee Gijs van Kuik Michel Verhaegen

This paper studies the load reduction potential of a prototyped “smart” rotor. This is, a rotor where the blades are equipped with a number of control devices that locally change the lift profile on the blade, combined with appropriate sensors and controllers. Experimental models, using dedicated system identification techniques, are developed of a scaled rotating two-bladed “smart” rotor of wh...

Journal: :JNW 2009
António Nogueira Paulo Salvador Andre Couto Rui Valadas

The number and variety of IP applications have hugely increased in the last few years. Among them, peer-to-peer (P2P) file-sharing applications have become very popular: more users are continuously joining such systems and more objects are being made available, seducing even more users to join. An accurate mapping of traffic to applications is important for a wide range of network management ta...

Abstract— Bot networks are a serious threat to cyber security, whose destructive behavior affects network performance directly. Detecting of infected HTTP communications is a big challenge because infected HTTP connections are clearly merged with other types of HTTP traffic. Cybercriminals prefer to use the web as a communication environment to launch application layer attacks and secretly enga...

2014
Hongwei Chen Dongyang Yu Chunzhi Wang Shuping Wang

This paper focuses on the sampling-based Deep Packet Inspection for the traffic of P2P file sharing systems, especially for BitTorrent, and proposes a logarithmic-based Adaptive Trust Sampling (ATS) strategy for P2P traffic identification. In the whole process of sampling identification for P2P traffic, the sampling ratio of the current node in a P2P network can automatically adjust and dynamic...

Journal: :JNW 2013
Jinghua Yan Xiaohui Fan

Recently, Peer-to-peer (P2P) networks have been widely applied in streaming media, instant messaging, file sharing and other fields, which have occupied more and more network bandwidth. Accurately identify P2P traffic is very important to management and control P2P traffic. In this paper, we introduce HFBP, a novel P2P identification scheme based on the host level and flow level behavior profil...

Journal: :ITU journal 2022

With the commercialization of fifth-generation (5G), rapid popularity mobile Over-The-Top (OTT) voice applications brings huge impacts on traditional telecommunication call services. Tunnel encryption technology such as Virtual Private Networks (VPNs) allow OTT users to escape supervision network operators easily, which may cause potential security risks cyberspace. To monitor harmful in contex...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید