메뉴 건너뛰기




Volumn 24, Issue 9, 2013, Pages 1807-1817

Modeling oscillation behavior of network traffic by nested hidden Markov model with variable state-duration

Author keywords

modeling; Network traffic; nonstationary; stationary; synthetic; traffic behavior

Indexed keywords

NETWORK TRAFFIC; NONSTATIONARY; STATIONARY; SYNTHETIC; TRAFFIC BEHAVIOR;

EID: 84881076393     PISSN: 10459219     EISSN: None     Source Type: Journal    
DOI: 10.1109/TPDS.2012.268     Document Type: Article
Times cited : (32)

References (41)
  • 1
    • 0000654791 scopus 로고
    • Oscillating behavior of network traffic: A case study simulation
    • L. Zhang and D. Clark, "Oscillating Behavior of Network Traffic: A Case Study Simulation," Internetworking: Research and Experience, vol. 1, no. 2, pp. 101-112, 1990.
    • (1990) Internetworking: Research and Experience , vol.1 , Issue.2 , pp. 101-112
    • Zhang, L.1    Clark, D.2
  • 3
    • 84881040426 scopus 로고    scopus 로고
    • Internet traffic periodicities and oscillations: A brief review
    • R. Smith, "Internet Traffic Periodicities and Oscillations: A Brief Review," rapid post, 2009.
    • (2009) Rapid Post
    • Smith, R.1
  • 5
    • 17644410745 scopus 로고    scopus 로고
    • On the wavelet spectrum diagnostic for Hurst parameter estimation in the analysis of Internet traffic
    • DOI 10.1016/j.comnet.2004.11.017, PII S1389128604003378, Long Range Dependent Traffic
    • S. Stoev, M. Taqqu, C. Park, and J. Marron, "On the Wavelet Spectrum Diagnostic for Hurst Parameter Estimation in the Analysis of Internet Traffic," Computer Networks, vol. 48, no. 3, pp. 423-445, 2005. (Pubitemid 40556724)
    • (2005) Computer Networks , vol.48 , Issue.3 , pp. 423-445
    • Stoev, S.1    Taqqu, M.S.2    Park, C.3    Marron, J.S.4
  • 8
    • 0032119668 scopus 로고    scopus 로고
    • The Hierarchical Hidden Markov Model: Analysis and Applications
    • S. Fine, Y. Singer, and N. Tishby, "The Hierarchical Hidden Markov Model: Analysis and Applications," Machine Learning, vol. 32, no. 1, pp. 41-62, 1998.
    • (1998) Machine Learning , vol.32 , Issue.1 , pp. 41-62
    • Fine, S.1    Singer, Y.2    Tishby, N.3
  • 9
  • 12
    • 0034245909 scopus 로고    scopus 로고
    • Multiresolution Image Classification by Hierarchical Modeling with Two-Dimensional Hidden Markov Models
    • Aug
    • J. Li, R. Gray, and R. Olshen, "Multiresolution Image Classification by Hierarchical Modeling with Two-Dimensional Hidden Markov Models," IEEE Trans. Information Theory, vol. 46, no. 5, pp. 1826-1841, Aug. 2002.
    • (2002) IEEE Trans. Information Theory , vol.46 , Issue.5 , pp. 1826-1841
    • Li, J.1    Gray, R.2    Olshen, R.3
  • 14
    • 79151484465 scopus 로고    scopus 로고
    • Energy-Efficient and High-Accuracy Secure Data Aggregation in Wireless Sensor Networks
    • H. Li, K. Lin, and K. Li, "Energy-Efficient and High-Accuracy Secure Data Aggregation in Wireless Sensor Networks," Computer Comm., vol. 34, no. 4, pp. 591-597, 2011.
    • (2011) Computer Comm , vol.34 , Issue.4 , pp. 591-597
    • Li, H.1    Lin, K.2    Li, K.3
  • 15
    • 79957530146 scopus 로고    scopus 로고
    • Low-Rate DDOS Attacks Detection and Traceback by Using New Information Metrics
    • June 2011
    • Y. Xiang, K. Li, and W. Zhou, "Low-Rate DDOS Attacks Detection and Traceback by Using New Information Metrics," IEEE Trans. Information Forensics and Security, vol. 6, no. 2, pp. 426-437, June 2011.
    • IEEE Trans. Information Forensics and Security , vol.6 , Issue.2 , pp. 426-437
    • Xiang, Y.1    Li, K.2    Zhou, W.3
  • 16
    • 84858038684 scopus 로고    scopus 로고
    • Trust Mechanisms in Wireless Sensor Networks: Attack Analysis and Countermeasures
    • Y. Yu, K. Li, W. Zhou, and P. Li, "Trust Mechanisms in Wireless Sensor Networks: Attack Analysis and Countermeasures," J. Network and Computer Applications, vol. 35, no. 3, pp. 867-880, 2012.
    • (2012) J. Network and Computer Applications , vol.35 , Issue.3 , pp. 867-880
    • Yu, Y.1    Li, K.2    Zhou, W.3    Li, P.4
  • 18
    • 84939061075 scopus 로고    scopus 로고
    • Traffic Modeling for Telecommunications Networks
    • V. Frost and B. Melamed, "Traffic Modeling for Telecommunications Networks," IEEE Comm. Magazine, vol. 32, no. 3, pp. 70-81, 2002.
    • (2002) IEEE Comm. Magazine , vol.32 , Issue.3 , pp. 70-81
    • Frost, V.1    Melamed, B.2
  • 19
    • 68349085747 scopus 로고    scopus 로고
    • Analysis and Modeling of a Campus Wireless Network TCP/IP Traffic
    • I. Lee and A. Fapojuwo, "Analysis and Modeling of a Campus Wireless Network TCP/IP Traffic," Computer Networks, vol. 53, no. 15, pp. 2674-2687, 2009.
    • (2009) Computer Networks , vol.53 , Issue.15 , pp. 2674-2687
    • Lee, I.1    Fapojuwo, A.2
  • 20
    • 0028377540 scopus 로고    scopus 로고
    • On the Self- Similar Nature of Ethernet Traffic (Extended Version)
    • W. Leland, M. Taqqu, W. Willinger, and D. Wilson, "On the Self- Similar Nature of Ethernet Traffic (Extended Version)," IEEE/ ACM Trans. Networking, vol. 2, no. 1, pp. 1-15, 2002.
    • (2002) IEEE/ ACM Trans. Networking , vol.2 , Issue.1 , pp. 1-15
    • Leland, W.1    Taqqu, M.2    Willinger, W.3    Wilson, D.4
  • 21
    • 0029253909 scopus 로고
    • Long Range Dependence in Variable Bit Rate Video Traffic
    • Feb.-Apr
    • J. Beran, R. Sherman, M. Taqqu, and W. Willinger, "Long Range Dependence in Variable Bit Rate Video Traffic," IEEE Trans. Comm., vol. 43, no. 234, pp. 1566-1579, Feb.-Apr. 1995.
    • (1995) IEEE Trans. Comm , vol.43 , Issue.234 , pp. 1566-1579
    • Beran, J.1    Sherman, R.2    Taqqu, M.3    Willinger, W.4
  • 22
    • 0031383380 scopus 로고    scopus 로고
    • Self-similarity in world wide web traffic: Evidence and possible causes
    • PII S1063669297087827
    • M. Crovella and A. Bestavros, "Self-Similarity in World Wide Web Traffic: Evidence and Possible Causes," IEEE/ACM Trans. Networking, vol. 5, no. 6, pp. 835-846, Dec. 1997. (Pubitemid 127768491)
    • (1997) IEEE/ACM Transactions on Networking , vol.5 , Issue.6 , pp. 835-846
    • Crovella, M.E.1    Bestavros, A.2
  • 23
    • 0029323403 scopus 로고
    • Wide Area Traffic: The Failure of Poisson Modeling
    • June
    • V. Paxson and S. Floyd, "Wide Area Traffic: The Failure of Poisson Modeling," IEEE/ACM Trans. Networking, vol. 3, no. 3, pp. 244-244, June 1995.
    • (1995) IEEE/ ACM Trans. Networking , vol.3 , Issue.3 , pp. 244-244
    • Paxson, V.1    Floyd, S.2
  • 24
    • 0032686283 scopus 로고    scopus 로고
    • A Multifractal Wavelet Model with Application to Network Traffic
    • R. Riedi, M. Crouse, V. Ribeiro, and R. Baraniuk, "A Multifractal Wavelet Model with Application to Network Traffic," IEEE Trans. Information Theory, vol. 45, no. 3, pp. 992-1018, 2002.
    • (2002) IEEE Trans. Information Theory , vol.45 , Issue.3 , pp. 992-1018
    • Riedi, R.1    Crouse, M.2    Ribeiro, V.3    Baraniuk, R.4
  • 25
    • 0029358766 scopus 로고    scopus 로고
    • On the Use of Fractional Brownian Motion in the Theory of Connectionless Networks
    • Aug
    • I. Norros, "On the Use of Fractional Brownian Motion in the Theory of Connectionless Networks," IEEE J. Selected Areas in Comm., vol. 13, no. 6, pp. 953-962, Aug. 2002.
    • (2002) IEEE J. Selected Areas in Comm , vol.13 , Issue.6 , pp. 953-962
    • Norros, I.1
  • 27
  • 28
    • 70549101150 scopus 로고    scopus 로고
    • Trace Data Characterization and Fitting for Markov Modeling
    • G. Casale, E. Zhang, and E. Smirni, "Trace Data Characterization and Fitting for Markov Modeling," Performance Evaluation, vol. 67, no. 2, pp. 61-79, 2010.
    • (2010) Performance Evaluation , vol.67 , Issue.2 , pp. 61-79
    • Casale, G.1    Zhang, E.2    Smirni, E.3
  • 29
    • 33947622589 scopus 로고    scopus 로고
    • An algorithm for fitting MMPP to IP traffic traces
    • DOI 10.1109/LCOMM.2007.061619
    • S. Bali and V. Frost, "An Algorithm for Fitting MMPP to IP Traffic Traces," IEEE Comm. Letters, vol. 11, no. 2, pp. 207-209, Feb. 2007. (Pubitemid 46502245)
    • (2007) IEEE Communications Letters , vol.11 , Issue.2 , pp. 207-209
    • Bali, S.1    Frost, V.S.2
  • 30
    • 0024610919 scopus 로고
    • A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition
    • Feb
    • L. Rabiner, "A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition," Proc. IEEE, vol. 77, no. 2, pp. 257-286, Feb. 1989.
    • (1989) Proc IEEE , vol.77 , Issue.2 , pp. 257-286
    • Rabiner, L.1
  • 31
    • 74149089478 scopus 로고    scopus 로고
    • Hidden Semi-Markov Models
    • S. Yu, "Hidden Semi-Markov Models," Artificial Intelligence, vol. 174, no. 2, pp. 215-243, 2010.
    • (2010) Artificial Intelligence , vol.174 , Issue.2 , pp. 215-243
    • Yu, S.1
  • 32
    • 24144485969 scopus 로고    scopus 로고
    • Markov models of internet traffic and a new hierarchical MMPP model
    • DOI 10.1016/j.comcom.2005.02.012, PII S0140366405000824
    • L. Muscariello, M. Mellia, M. Meo, M. Ajmone Marsan, and R. Lo Cigno, "Markov Models of Internet Traffic and a New Hierarchical MMPP Model," Computer Comm., vol. 28, no. 16, pp. 1835- 1851, 2005. (Pubitemid 41230088)
    • (2005) Computer Communications , vol.28 , Issue.16 , pp. 1835-1851
    • Muscariello, L.1    Mellia, M.2    Meo, M.3    Ajmone Marsan, M.4    Lo Cigno, R.5
  • 34
    • 0037278070 scopus 로고    scopus 로고
    • An Efficient Forward-Backward Algorithm for an Explicit-Duration Hidden Markov Model
    • Jan
    • S. Yu and H. Kobayashi, "An Efficient Forward-Backward Algorithm for an Explicit-Duration Hidden Markov Model," IEEE Signal Processing Letters, vol. 10, no. 1, pp. 11-14, Jan. 2003.
    • (2003) IEEE Signal Processing Letters , vol.10 , Issue.1 , pp. 11-14
    • Yu, S.1    Kobayashi, H.2
  • 37
    • 0014254846 scopus 로고
    • Probability Plotting Methods for the Analysis for the Analysis of Data
    • M. Wilk and R. Gnanadesikan, "Probability Plotting Methods for the Analysis for the Analysis of Data," Biometrika, vol. 55, no. 1, pp. 1-17, 1968.
    • (1968) Biometrika , vol.55 , Issue.1 , pp. 1-17
    • Wilk, M.1    Gnanadesikan, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.