期刊文献+
共找到9篇文章
< 1 >
每页显示 20 50 100
A Novel Deep Learning Method for Application Identification in Wireless Network 被引量:8
1
作者 Jie Ren Zulin Wang 《China Communications》 SCIE CSCD 2018年第10期73-83,共11页
In modern wireless communication network, the increased consumer demands for multi-type applications and high quality services have become a prominent trend, and put considerable pressure on the wireless network. In t... In modern wireless communication network, the increased consumer demands for multi-type applications and high quality services have become a prominent trend, and put considerable pressure on the wireless network. In that case, the Quality of Experience(Qo E) has received much attention and has become a key performance measurement for the application and service. In order to meet the users' expectations, the management of the resource is crucial in wireless network, especially the Qo E based resource allocation. One of the effective way for resource allocation management is accurate application identification. In this paper, we propose a novel deep learning based method for application identification. We first analyse the requirement of managing Qo E for wireless communication, and review the limitation of the traditional identification methods. After that, a deep learning based method is proposed for automatically extracting the features and identifying the type of application. The proposed method is evaluated by using the practical wireless traffic data, and the experiments verify the effectiveness of our method. 展开更多
关键词 quality of experience application identification protocol identification deeplearning feature extraction
下载PDF
Extended Overlapping Community Detection Algorithm by Label Propagation for Internet Application Identification 被引量:1
2
作者 Yu Ke Zhang Xinyu +2 位作者 Di Jiaxi Wu Xiaofei Su Sixi 《China Communications》 SCIE CSCD 2012年第12期22-35,共14页
The increased capacity and availability of the Intemet has led to a wide variety of applications. Intemet traffic characterization and application identification is important for network management. In this paper, bas... The increased capacity and availability of the Intemet has led to a wide variety of applications. Intemet traffic characterization and application identification is important for network management. In this paper, based on detailed flow data collected from the public networks of Intemet Service Providers, we construct a flow graph to model the interactions among users. Considering traffic from different applications, we analyze the community structure of the flow graph in terms of cormmunity size, degree distribution of the community, community overlap, and overlap modularity. The near linear time community detection algorithm in complex networks, the Label Propagation Algorithm (LPA), is extended to the flow graph for application identification. We propose a new initialization and label propagation and update scheme. Experimental results show that the proposed algorithm has high accuracy and efficiency. 展开更多
关键词 application identification communitydetection label propagation complex network Intemet traffic flow
下载PDF
Network traffic identification in packet sampling environment 被引量:1
3
作者 Shi Dong Yuanjun Xia 《Digital Communications and Networks》 SCIE CSCD 2023年第4期957-970,共14页
With the rapid growth of network bandwidth,traffic identification is currently an important challenge for network management and security.In recent years,packet sampling has been widely used in most network management... With the rapid growth of network bandwidth,traffic identification is currently an important challenge for network management and security.In recent years,packet sampling has been widely used in most network management systems.In this paper,in order to improve the accuracy of network traffic identification,sampled NetFlow data is applied to traffic identification,and the impact of packet sampling on the accuracy of the identification method is studied.This study includes feature selection,a metric correlation analysis for the application behavior,and a traffic identification algorithm.Theoretical analysis and experimental results show that the significance of behavior characteristics becomes lower in the packet sampling environment.Meanwhile,in this paper,the correlation analysis results in different trends according to different features.However,as long as the flow number meets the statistical requirement,the feature selection and the correlation degree will be independent of the sampling ratio.While in a high sampling ratio,where the effective information would be less,the identification accuracy is much lower than the unsampled packets.Finally,in order to improve the accuracy of the identification,we propose a Deep Belief Networks Application Identification(DBNAI)method,which can achieve better classification performance than other state-of-the-art methods. 展开更多
关键词 Network measurement application identification Packet sampling application behavior CHARACTERISTIC Metric correlation Network management
下载PDF
Artificial Neural Network Method Based on Expert Knowledge and Its Application to Quantitative Identification of Potential Seismic Sources
4
作者 Hu Yinlei and Zhang YumingInstitute of Geology,SSB,Beijing 100029,China 《Earthquake Research in China》 1997年第2期64-72,共9页
In this paper,an approach is developed to optimize the quality of the training samples in the conventional Artificial Neural Network(ANN)by incorporating expert knowledge in the means of constructing expert-rule sampl... In this paper,an approach is developed to optimize the quality of the training samples in the conventional Artificial Neural Network(ANN)by incorporating expert knowledge in the means of constructing expert-rule samples from rules in an expert system,and through training by using these samples,an ANN based on expert-knowledge is further developed.The method is introduced into the field of quantitative identification of potential seismic sources on the basis of the rules in an expert system.Then it is applied to the quantitative identification of the potential seismic sources in Beijing and its adjacent area.The result indicates that the expert rule based on ANN method can well incorporate and represent the expert knowledge in the rules in an expert system,and the quality of the samples and the efficiency of training and the accuracy of the result are optimized. 展开更多
关键词 Artificial Neural Network Method Based on Expert Knowledge and Its application to Quantitative identification of Potential Seismic Sources LENGTH
下载PDF
Analysis of Malware Application Based on Massive Network Traffic 被引量:4
5
作者 Xiaolin Gui Jun Liu +2 位作者 Mucong Chi Chenyu Li Zhenming Lei 《China Communications》 SCIE CSCD 2016年第8期209-221,共13页
Security and privacy issues are magnified by velocity, volume, and variety of big data. User's privacy is an even more sensitive topic attracting most people's attention. While XcodeGhost, a malware of i OS em... Security and privacy issues are magnified by velocity, volume, and variety of big data. User's privacy is an even more sensitive topic attracting most people's attention. While XcodeGhost, a malware of i OS emerging in late 2015, leads to the privacy-leakage of a large number of users, only a few studies have examined XcodeGhost based on its source code. In this paper we describe observations by monitoring the network activities for more than 2.59 million i Phone users in a provincial area across 232 days. Our analysis reveals a number of interesting points. For example, we propose a decay model for the prevalence rate of Xcode Ghost and we find that the ratio of the infected devices is more than 60%; that a lot of popular applications, such as Wechat, railway 12306, didi taxi, Youku video are also infected; and that the duration as well as the traffic volume of most Xcode Ghost-related HTTP-requests is similar with usual HTTP-request which makes it difficult to be found. Besides, we propose a heuristic model based on fingerprint and its web-knowledge to identify the infected applications. The identifying result shows the efficiency of this model. 展开更多
关键词 Xcode Ghost big data network security applications identification
下载PDF
A SEQUENTIAL TESTING PROGRAM FOR PREDICTING AND IDENTIFICATING CARCINOGENS AND ITS APPLICATION
6
作者 周宗灿 方积乾 +2 位作者 王纪宪 傅娟龄 徐厚恩 《Chinese Journal of Cancer Research》 SCIE CAS CSCD 1992年第1期71-81,共11页
In this paper our studies about the sequential testing program for predicting and identificating carcinogens, sequential discriminant method and cost- effectiveness analysis are summarized. The analysis of our databas... In this paper our studies about the sequential testing program for predicting and identificating carcinogens, sequential discriminant method and cost- effectiveness analysis are summarized. The analysis of our database of carcinogeniclty and genotoxicity of chemicals demonstrates the uncertainty . of short- term tests ( STTs ) to predict carcinogens and the results of most routine STTs are statistically dependent. We recommend the sequential testing program combining STTs and carclnogenicity assay, the optimal STT batteries, the rules of the sequential discrimination and the preferal choices of STTs tor specific chemical class. For illustrative pmposes the carclnogenicity prediction of several sample chamicals is presented. The results of cost-effectiveness analysis suggest that this program has vast social-economic effectiveness. 展开更多
关键词 STT A SEQUENTIAL TESTING PROGRAM FOR PREDICTING AND IDENTIFICATING CARCINOGENS AND ITS application MNT PRO test 加加
下载PDF
Application type identification of Internet flows based on medium mathematics 被引量:3
7
作者 CHENG Wei-qing GONG Jian +1 位作者 DING Wei SUN Zhi-xin 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2010年第6期72-79,88,共9页
Internet application identification is needed by network management in many aspects,such as quality of service (QoS) management,intrusion detection,traffic engineering,accounting,and so on. This article makes an in-... Internet application identification is needed by network management in many aspects,such as quality of service (QoS) management,intrusion detection,traffic engineering,accounting,and so on. This article makes an in-depth study of precise identification of Internet applications by using flow characteristics instead of well-known port or application signature match. A novel approach that identifies the application type of an Internet protocol (IP) flow by finding what flow the flow looks the most like based on medium mathematics system (MMS) is proposed. The approach differs from previous ones mainly in two aspects:it has inherent scalability due to its use of the measure of n-dimensional medium truth degree; not only features of a flow,but also the association between the flow and the other flows of the same host as well as the relation among all flows of a host are employed to recognize a flow's application type. For the present,some popular applications are concentrated on,and up to six application types can be identified with better accuracy. The results of experiments conducted on Internet show that the proposed methodology is effective and deserves attention. 展开更多
关键词 application type identification flow characteristics measure of medium truth degree MMS
原文传递
Accelerating Application Identification with Two-Stage Matching and Pre-Classification 被引量:1
8
作者 何飞 项帆 +2 位作者 邵熠阳 薛一波 李军 《Tsinghua Science and Technology》 SCIE EI CAS 2011年第4期422-431,共10页
Modern datacenter and enterprise networks require application identification to enable granular traffic control that eJther Jmproves data transfer rates or ensures network security. Providing application visi- bility ... Modern datacenter and enterprise networks require application identification to enable granular traffic control that eJther Jmproves data transfer rates or ensures network security. Providing application visi- bility as a core network function is challenging due to its performance requirements, including high through- put, low memory usage, and high identification accuracy. This paper presents a payload-based application identification method using a signature matching engine utilizing characteristics of the application identifica- tion. The solution uses two-stage matching and pre-classification to simultaneously improve the throughput and reduce the memory. Compared to a state-of-the-art common regular expression engine, this matching engine achieves 38% memory use reduction and triples the throughput. In addition, the solution is orthogonal to most existing optimization techniques for regular expression matching, which means it can be leveraged to further increase the performance of other matching algorithms. 展开更多
关键词 application identification deep inspection regular expression traffic classification
原文传递
Structural Insights on Internet Traffic:Community Overlapping and Correlations
9
作者 吴晓非 禹可 +1 位作者 狄佳玺 苏驷希 《China Communications》 SCIE CSCD 2013年第10期101-114,共14页
There is an increasing number of Internet applications, which leads to an increasing network capacity and availability. Internet traffic characterisation and application identification are, therefore, more important f... There is an increasing number of Internet applications, which leads to an increasing network capacity and availability. Internet traffic characterisation and application identification are, therefore, more important for efficient network management. In this paper, we construct flow graphs from detailed Internet traffic data collected from the public networks of Internet Service Providers. We analyse the community structures of the flow graph that is naturally formed by different applications. The community size, degree distribution of the community, and community overlap of 10 Internet applications are investigated. We further study the correlations between the communities from different applications. Our results provide deep insights into the behaviour Internet applications and traffic, which is helpful for both network management and user behaviour analysis. 展开更多
关键词 application identification overlapping community complex network Internet traffic flow correlation coefficient
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部