用户名: 密码: 验证码:
基于网络流量监测的移动互联网特征研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着移动通信技术的发展,移动互联网用户逐年增多,多种移动网络应用已经成为人们生活的一部分。移动互联网因其场景的复杂性,流量的众多特征还未被学术界所认识。网络流量监测技术可以对移动网络流量进行保存,再借助数据挖掘等技术可以分析移动互联网的流量特征并对网络的特征值构建模型,从而为移动网络的设计和优化提供参考。本文的主要研究内容和创新点如下:
     (1)将云计算技术引入网络流量监测领域,创新性的利用云计算平台实现移动网络流量的存储和分析,构建了基于Hadoop云计算的海量网络流量分析平台。该平台可以实现对网络流量数据的分布式存储,用户通过提交脚本的方式实现分布式运算,极大的便利了海量网络流量的存储和处理。相关实验也证明本文基于Hadoop云计算的海量网络流量分析平台具有非常高的效率。
     平台由数据导入模块、脚本解析模块、作业执行模块三大部分构成。数据导入模块是整个系统的基础,主要负责原始网络流记录的导入,清洗和索引的建立。脚本解析模块对用户编写的脚本进行检查后转换成MapReduce任务,由作业执行模块提交到Hadoop平台进行执行。本文对各模块的流程进行了说明,并对本文设计的网络流量分析脚本Log-QL语言的设计及解析方案进行详细说明。文中还对实验室的云计算平台进行了简要说明,并利用国内真实互联网采集的流量数据进行性能测试,证明了基于Hadoop云计算的海量网络流量分析平台的高效性。
     (2)采用从国内某大城市骨干节点采集的CDMA移动互联网流量和ADSL固定互联网流量,对两种网络流量特征进行对比研究。首先对根据采集自真实网络流量的流量数据进行ARIMA模型建模,选取了较为合理的网络流量样本。并进行流量特征分析研究,内容包括协议分布,网络流长分布,流持续时间分布,两种网络的业务分布等。并对P2P流媒体协议特征进行研究及建模。
     研究发现,监测的CDMA网络和ADSL网络流量分布都符合ARIMA模型。CDMA网络的传输协议以TCP为主,ADSL网络UDP协议流量占比更大。CDMA网络流的平均报文长度小于ADSL网络,且CDMA网络流的流持续时间小于ADSL网络,反映了移动网络的不稳定性。此外,在CDMA网络中的流下行/上行的比例要大于ADSL网络网络。基于两种网络的不同应用的流量分布,可以看到在CDMA网络中,网页浏览类应用占主导的地位,而新媒体类的应用逐渐占据了ADSL网络中的大部分流量。最后本文对网络中重点业务P2P流媒体的节点数分布进行了研究,发现CDMA网络和ADSL网络的P2P流媒体业务节点数符合不同的分布模型。
     (3)利用云计算平台对彩信业务的流量分布规律及统计特性进行研究分析,基于国内某省采集的时长为1年的彩信流量。研究内容包括移动用户维度以及不同时间维度的彩信业务流量分布规律等。通过长时间粒度和短时间粒度对监测省份的彩信业务发送量、发送时间及发送速率等内容进行分析,并对短时间粒度的2G/3G彩信、个人与非个人彩信进行分析,最后对个人彩信到达间隔构建了模型。
     本文使用在现网骨干网节点部署的10G速率的流量监测设备,采集南方某省时长为1年的彩信流量。文中对彩信的服务架构及数据采集过程进行了说明。流量特征分析分为长时间粒度和短时间粒度的分析。长时间粒度包含全年彩信发送量、彩信协议类型与端口号分布、全年彩信的成功率与失败率、彩信内容长度分布、接收时长分布以及传输速率分布。发现监测网络主要使用WAP2.0协议发送彩信,彩信长度集中在30至70KB,彩信接收时间通常为10秒,彩信发送速率集中在20至40Kbps。在进行短时间粒度的分析时,选取一周的彩信流量作为分析样本,主要研究了个人彩信与非个人彩信的流量特征,2G和3G彩信流量特征。发现监测网络中97%的彩信由2G网络进行发送,3G彩信的平均传输速度是2G彩信的三倍。最后对个人彩信的到达间隔进行了建模,发现Weibull分布可以较好的对个人彩信到达间隔进行拟合。
     (4)针对网络的服务质量分析的需要,本文提出了一种基于K均值算法和C4.5算法的级联式的网络质量分析算法。该算法可以适用于不同种类的网络质量监测数据,通过现网采集的网络质量测量数据进行实验,验证了该算法的有效性和高效性。
     算法处理对象为本研究团队研发的“面向用户的主动网络测量系统”采集的移动网络测量数据。该系统部署在国内南方某省的多个城市的移动网络节点,进行网络质量测量。网络质量分析算法分为训练模块和分析判别模块两个模块,训练模块对历史数据进行建模,分析判别模块利用建模数据对新的测量数据进行综合判定。在进行算法效果验证时,本文进行了大量的实验选取合理的K值和C4.5算法的等距离散值,并利用KKZ算法来进行聚类中心点的初始化选取。利用多个监测数据,证明了本文提出的级联算法的高效性。且该算法适用于不同的监测数据,它可以有效的调节单一算法的缺陷,总体提升判别指标的性能。
With the rapid development of mobile communication technologies, the mobile Internet user scale is increasing year after year. In this scenario, numerous mobile services have become part of people's lives. For the complex scenes of the mobile Internet, many of the characteristics are not fully understood. With the help of network traffic monitoring techniques, and also Cloud Computing and Data Mining, we analyze the characteristics of mobile Internet, build models on network traffic traces. The major contributions of the paper are as follows.
     (1)We introduced the Cloud Computing technique into the area of network traffic monitoring. We used Cloud Computing platform to perform data analysis and data storage for the first time. Our Hadoop based network traffic analysis platform supports distributed storage. Users can do distributed computing by uploading scripts. The experiments in this paper also prove that our Hadoop based network traffic analysis platform is very efficient.
     Data import module, script analyzing module, task implementation module are three major modules in our analysis platform. Data import module is the basis of the platform, which takes charge of uploading network traffic. Script analyzing module interprets scripts language into queries or commands. Task implementation module submits tasks onto the Hadoop framework. The Cloud Computing cluster used in the paper was also described. Based on the network traffic captured at major nodes of China, we proved the high efficiency of the platform.
     (2) We compared the network traffic characteristics of CDMA network and ADSL network based on the traffic captured at a major node in Southern China. We built an ARIMA traffic model on the two traces, in order to choose proper network traffic samples. The detailed analyses include network protocol distribution, network traffic flow duration distribution, network traffic flow length distribution etc., applications traffic distribution and characteristics of P2P streaming traffic.
     We found that the average packet length of CDMA trace is smaller than the ADSL traffic trace, indicating that ADSL network can support a better access service. Besides, the download/upload ratio in CDMA network is bigger. The average TCP flow duration in ADSL network is bigger than that in CDMA network, while the standard deviation is smaller in ADSL. Based on the network traffic, we found that the new media applications are taking over the majority of the ADSL network. While in the CDMA network, Web browsing is still in the dominant position. Finally, we conducted research on the peer distribution of P2P streaming traffc, and find that the ADSL and CDMA network flows follow different distributions.
     (3) We study the MMS (Multimedia Messaging Service) traffic distributions and flow characteristics based on the Cloud Computing platform. It includes traffic characteristics of user scale and different time scale etc. Through the long and short time scale traffic analyses, we analyze the MMS number distribution, transmission time, transmission rate, and build model on the personal MMS inter-arrival time.
     We use a network traffic monitoring system deployed at the backbone network in Southen China to capture the MMS traffic for a year. In the paper, firstly, we describe the MMS framework and the data capturing procedure. The analyses are divided into long scale and short scale. The former one includes the numbers of MMS transmission per day, MMS protocol distribution, port distribution, Success and Failure rate and content length distribution. The latter one is based on one week MMS traffic, include the personal and non-personal MMS traffic characteristics,2G/3G traffic characteristics, personal transmission rate distributioa At last we build a model on the personal MMS inter-arrival time.
     (4) In terms of network operating QoS analysis, we propose a cascading network QoS analyzing algorithm based on K-means and C4.5algorithm. The algorithm was testified to be suitable for multiple analyze requirements. Also based on the monitoring data captured from the real Internet, the algorithm was proved to be effective and efficient.
     The algorithm includes training module and discriminant analysis module. The training module build module based on the historical data, the discriminant analysis module make final decision based on the module. The algorithm processes the data captured from the project "User-oriented Active Network Measurement System". The system is deployed at multiple wireless network accessing points, conducting network QoS monitoring24hours. The paper covers experiments to find a proper K and C4.5discrete value, and use the KKZ algorithm to initialize the cluster center values. Based on the six traces of monitoring data, we compared the performances of cascading network QoS analyzing algorithm, K-mean algorithm and C4.5algorithm. As a result, the cascading algorithm was highly efficient and reduces the noise of single algorithm; also it proved to be suitable to several types of monitoring data.
引文
[1]中国互联网络信息中心(CNNIC)第31次中国互联网络发展状况统计报告.http://www.cnnic.net.cn/hlwfzyj/hlwxzbg/hlwtjbg/201301/P02013012260039953 0412.pdf 2012.
    [2]De Vriendt J, Laine P, Lerouge C, et al.Mobile network evolution:a revolution on the move. Communications Magazine, IEEE.2002,40(4):104-111.
    [3]Network Monitoring Definition and Solutions, http://www.cio. com/article/133700/Network_Monitoring_Definition_and_Solutio ns.
    [4]Hansen T, Otero J, Mcgregor T, et al.Active Measurement Data Analysis Techniques.2000.
    [5]Agarwal D, Gonzalez J M, Jin G, et al.An infrastructure for passive network monitoring of application data streams.2003.
    [6]Matthews W, Cottrell L.The PingER project:active Internet performance monitoring for the HENP community. Communications Magazine, IEEE. 2000,38(5):130-136.
    [7]Jackson A W, Sterbenz J P G, Condell M N, et al.Active network monitoring and control:the SENCOMM architecture and implementation:DARPA Active NEtworks Conference and Exposition,2002. Proceedings.2002.379-393.
    [8]Jain M, Dovrolis C.Pathload:A Measurement Tool for End-to-End Available Bandwidth.2002.14-25.
    [9]Cleary J, Donnelly S, Graham I, et al.Design principles for accurate passive measurement:Proceedings of PAM.2000.
    [10]Arlos P, Fiedler M, Nilsson A.A Distributed Passive Measurement Infrastructure.2005,3431:215-227.
    [11]Wolf T, Ramaswamy R, Bunga S, et al.An Architecture for Distributed Real-Time Passive Network Measurement:Modeling, Analysis, and Simulation of Computer and Telecommunication Systems,2006. MASCOTS 2006.14th IEEE International Symposium on. 2006(3).35-344.
    [12]Sniffer Pro. http://www.packet-sniffer.net/sniffer-pro.htm.
    [13]Portoles-Comeras M, Requena-Esteso M, Mangues-Bafalluy J, et al.Monitoring wireless networks:performance assessment of sniffer architectures: Communications,2006. ICC'06. IEEE International Conference on. 2006:2, 646-651.
    [14]Qadeer M A, Zahid M, Iqbal A, et al.Network Traffic Analysis and Intrusion Detection Using Packet Sniffer:Communication Software and Networks,2010. ICCSN'10. Second International Conference on. 2010.313-317.
    [15]Case J, Fedor M, Schoffstall M, et aLA simple network management protocol (SNMP). Network Information Center, SRI International,!989.
    [16]Schonwalder J, Pras A, Harvan M, et aLSNMP Traffic Analysis:Approaches, Tools, and First Results:Integrated Network Management,2007. IM'07.10th IFIP/IEEE International Symposium on. 2007.323-332.
    [17]Scho X, Nwa X, Lder J, et al.On the Impact of Security Protocols on the Performance of SNMP. Network and Service Management, IEEE Transactions on. 2011,8(1)52-64.
    [18]Claise B.Cisco systems NetFlow services export version 9.2004.
    [19]Yuhui L, Jinshan S, Rui S, et al.Next Generation Internet Traffic Monitoring System Based on NetFlow:Intelligent System Design and Engineering Application (ISDEA),2010 International Conference on. 2010:1,1006-1009.
    [20]Yingying C, Jain S, Adhikari V K, et aLA first look at inter-data center traffic characteristics via Yahoo! datasets:INFOCOM,2011 Proceedings IEEE.2011. 1620-1628.
    [21]Phaal P, Panchen S, McKee N.InMon corporation's sFlow. A method for monitoring traffic in switched and routed networks. RFC 3176,2001.
    [22]Kobayashi A, Toyama K.Method of Measuring VoIP Traffic Fluctuation with Selective sFtow:Applications and the Internet Workshops,2007. SAINT Workshops 2007. International Symposium on. 2007.89.
    [23]Kent A, Gavrilov E M, Fisk M E.Network Host Classification Using Statistical Analysis of Flow Data. Network system research Los Alamos National Laboratory.2010.
    [24]Chitre V A, Daigle J N.IP traffic over GPRS-an Internet service oriented analysis:Wireless Communications and Networking Conference,1999. WCNC. 1999 IEEE.1999.1263-1267.
    [25]Kalden R A.Mobile internet traffic measurement and modeling based on data from commercial GPRS networks:Enschede,2004.
    [26]Kitahara T, Riikonen A, Ha X, et aLCharacterizing traffic generated with laptop computers and mobile handsets in GPRS/UMTS core networks:Local Computer Networks (LCN),2010 IEEE 35th Conference on. 2010.1046-1053.
    [27]Jae Y C, Yeongrak C, Byungchul P, et alMeasurement analysis of mobile traffic in enterprise networks:Network Operations and Management Symposium (APNOMS),2011 13th Asia-Pacific.2011.1-4.
    [28]Jin Y, Duffield N, Gerber A, et al.Characterizing data usage patterns in a large cellular network:Proceedings of the 2012 ACM SIGCOMM workshop on Cellular networks:operations, challenges, and future design. Helsinki, Finland: ACM,2012.7-12.
    [29]Baghel S K, Keshav K, Manepalli V R.An investigation into traffic analysis for diverse data applications on smartphones:Communications (NCC),2012 National Conference on. 2012.1-5.
    [30]Klemm A, Lindemann C, Lohmann M.Traffic modeling and characterization for UMTS networks:Global Telecommunications Conference,2001. GLOBECOM'01. IEEE. IEEE,2001:3,1741-1746.
    [31]Araujo H, Costa J, Correia L M.Analysis of a traffic model for GSM/GPRS: Personal, Indoor and Mobile Radio Communications,2001 12th IEEE International Symposium on. 2001:1,124-128.
    [32]Irnich T, Stuckmann P.Fluid-flow modelling of internet traffic in GSM/GPRS networks. Computer Communications.2003,26(15):1756-1763.
    [33]Ivanovich M, Li J, Neame T, et al.Modelling GPRS data traffic:Global Telecommunications Conference,2004. GLOBECOM'04. IEEE.2004:5, 3300-3304.
    [34]Karagiannis T, Molle M, Faloutsos M. Long-range dependence ten years of Internet traffic modeling. Internet Computing, IEEE.2004,8(5)57-64.
    [35]Shafiq M Z, Ji L, Liu A X, et al.Characterizing and modeling internet traffic dynamics of cellular devices:Proceedings of the ACM SIGMETRICS joint international conference on Measurement and modeling of computer systems. San Jose, California, USA:ACM,2011.305-316.
    [36]Koodli R, Puuskari M.Supporting packet-data QoS in next generation cellular networks. Communications Magazine, IEEE.2001,39(2):180-188.
    [37]Soh W, Kim H S.QoS provisioning in cellular networks based on mobility prediction techniques. Communications Magazine, IEEE.2003,41(1):86-92.
    [38]Li W, Chao X.Modeling and performance evaluation of a cellular mobile network. Networking, IEEE/ACM Transactions on. 2004,12(1):131-145.
    [39]Wu D, Negi R.Downlink scheduling in a cellular network for quality-of-service assurance. Vehicular Technology, IEEE Transactions on. 2004,53(5):1547-1557.
    [40]Zainuddin Z, Paundu A W.End user based measurement system for cellular packet data network performance:Communication, Networks and Satellite (ComNetSat),2012 IEEE International Conference on. IEEE,2012.133-137.
    [41]Kim D, Zhang D, Bhushan N, et aLAdmission control for cellular networks with direct QoS monitoring. Wireless Networks.2013,19(2):131-144.
    [42]Big data. http://en.wikipedia.org/wiki/Big_data.
    [43]Bill Gerhardt K G R K.Unlocking Value in the Fragmented World of Big Data Analytics. http://www.cisco.com/web/about/ac79/docs/sp/Information-Infomediaries.pdf. 2012.
    [44]Cloud computing. http://en.wikipedia.org/wiki/Cloud_computing.
    [45]Ghemawat S, Gobioff H, Leung S.The Google file system. SIGOPS Oper. Syst. Rev.2003,37(5)29-43.
    [46]Amazon Elastic Compute Cloud (Amazon EC2). http;//aws.amazon.com/cn/ec2/.
    [47]Hadoop. http://hadoop.apache.org/.
    [48]Sandholm T, Lai K.Dynamic proportional share scheduling in Hadoop: Proceedings of the 15th international conference on Job scheduling strategies for parallel processing. Atlanta, GA:Springer-Verlag,2010.110-131.
    [49]Zaharia M, Konwinski A, Joseph A D, et al.Improving MapReduce performance in heterogeneous environments:Proceedings of the 8th USENIX conference on Operating systems design and implementation. San Diego, California:USENIX Association,2008.29-42.
    [50]Kc K, Anyanwu K.Scheduling Hadoop Jobs to Meet Deadlines:Proceedings of the 2010 IEEE Second International Conference on Cloud Computing Technology and Science. IEEE Computer Society,2010.388-392.
    [51]Nagle D, Serenyi D, Matthews A.The Panasas ActiveScale Storage Cluster: Delivering Scalable High Bandwidth Storage:Proceedings of the 2004 ACM/IEEE conference on Supercomputing. IEEE Computer Society,2004.53.
    [52]Ghemawat S, Gobioff H, Leung S.The Google file system SIGOPS Oper. Syst. Rev.2003,37(5)29-43.
    [53]Shvachko K, Kuang H, Radia S, et aLThe Hadoop Distributed File System: Proceedings of the 2010 IEEE 26th Symposium on Mass Storage Systems and Technologies (MSST). IEEE Computer Society,2010.1-10.
    [54]Lar S U, Xiaofeng L, Abbas S A.Cloud computing privacy & security global issues, challenges,& mechanisms:Communications and Networking in China (CHINACOM),2011 6th International ICST Conference on. 2011. 1240-1245.
    [55]Minqi Z, Rong Z, Wei X, et al.Security and Privacy in Cloud Computing:A Survey:Semantics Knowledge and Grid (SKG),2010 Sixth International Conference on. 2010.105-112.
    [56]Roy I, Setty S T V, Kilzer A, et al.Airavat:security and privacy for MapReduce: Proceedings of the 7th USENIX conference on Networked systems design and implementation. San Jose, California:USENIX Association,2010.20.
    [57]Youngseok L, Wonchul K, Hyeongu S.An Internet traffic analysis method with MapReduce:Network Operations and Management Symposium Workshops (NOMS Wksps),2010 IEEE/IFIP.2010.357-361.
    [58]Lee Y, Kang W, Lee Y.A hadoop-based packet trace processing tool: Proceedings of the Third international conference on Traffic monitoring and analysis. Vienna, Austria:Springer-Verlag,2011.51-63.
    [59]ADSL. http://en.wikipedia.org/wiki/Asymmetric_digital_subscriber_line.
    [60]CDMA. http://en.wikipedia.org/wiki/Code_division_multiple_access.
    [61]中国宽带用户调查报告.http://tech.163.com/12/0628/03/8529G97J00094MOK.html.
    [62]Maier G, Feldmann A, Paxson V, et al.On dominant characteristics of residential broadband internet traffic:Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference. Chicago, Illinois, USA:ACM, 2009.90-102.
    [63]Kim M, Won Y J, Hong J W.Characteristic analysis of internet traffic from the perspective of flows. Comput. Commun. 2006,29(10):1639-1652.
    [64]Ribeiro V J, Zhang Z, Moon S, et al.Small-time scaling behavior of Internet backbone traffic. Comput. Netw.2005,48(3)315-334.
    [65]Rodrigues L, Guardieiro P R.A spatial and temporal analysis of Internet aggregate traffic at the flow level:Global Telecommunications Conference,2004. GLOBECOM'04. IEEE.2004:2,685-691.
    [66]Azzouna N B, Guillemin F. Analysis of ADSL traffic on an IP backbone link: Global Telecommunications Conference,2003. GLOBECOM'03. IEEE.2003:7, 3742-3746.
    [67]Shouyi Y, Xiaokang L.Traffic self-similarity in mobile ad hoc networks: Wireless and Optical Communications Networks,2005. WOCN 2005. Second IFIP International Conference on.2005.285-289.
    [68]Pries R, Wamser F, Staehle D, et al.On Traffic Characteristics of a Broadband Wireless Internet Access:Next Generation Internet Networks,2009. NGI'09. 2009.1-7.
    [69]Tang D, Baker M.Analysis of a local-area wireless network:Proceedings of the 6th annual international conference on Mobile computing and networking. Boston, Massachusetts, USA:ACM,2000.1-10.
    [70]ChunZhi W, Xin Z, Fangping Y, et al.Design of P2P Traffic Identification Based on DPI and DFI:Computer Network and Multimedia Technology,2009. CNMT 2009. International Symposium on. 2009.1-4.
    [71]Luying C, Rong C, Jie Y, et aLP2P Streaming Traffic Classification in High-Speed Networks. China Communications.2011,8(5):70-78.
    [72]范剑青.非线性时间序列:建模、预报及应用.姚琦伟.高等教育出版社,2005.
    [73]Garcia-Dorado J L, Hernandez J A, Aracil J, et aLOn the duration and spatial characteristics of internet traffic measurement experiments. Communications Magazine, IEEE.2008,46(11):148-155.
    [74]Inc C S.Cisco Visual Networking Index-Forecast andMethodology,2010-2015. 2011.
    [75]P2PTV. http://en.wikipedia.org/wiki/P2PTV.
    [76]Kantardzic Mehmed.数据挖掘:概念、模型、方法和算法.北京:清华大学出版社,2003.
    [77]Sevanto J.Multimedia messaging service for GPRS and UMTS:Wireless Communications and Networking Conference,1999. WCNC.1999 IEEE.1999. 1422-1426.
    [78]彩信的发展历程.http://column.chinabyte.com/ccclub/232/3387732.shtml. 2008.
    [79]Peersman C, Cvetkovic S, Griffiths P, et aLThe Global System for Mobile Communications Short Message Service. Personal Communications, IEEE. 2000,7(3):15-23.
    [80]Hui-Nien H, Yi-Bing L, Ming-Kun L, et aL A statistic approach for deriving the short message transmission delay distributions. Wireless Communications, IEEE Transactions on. 2004,3(6)2345-2352.
    [81]Zerfos P, Meng X, Wong S H Y, et aL A study of the short message service of a nationwide cellular network:Proceedings of the 6th ACM SIGCOMM conference on Internet measurement. Rio de Janeriro, Brazil:ACM,2006. 263-268.
    [82]王华奎.移动通信原理与技术.清华大学出版社,2009.
    [83]Ghaderi M, Keshav S.Multimedia Messaging Service:System Description and Performance Analysis:Proceedings of the First International Conference on Wireless Internet. IEEE Computer Society,2005.198-205.
    [84]Yieh-Ran H.Admission Control for Delay-Bounded Message Transfer in an MMS Environment. Vehicular Technology, IEEE Transactions on. 2010,59(8)3979-3991.
    [85]Mostafa M E.MMS-the modern wireless solution for multimedia messaging: Personal, Indoor and Mobile Radio Communications,2002. The 13th IEEE International Symposium on. 2002:5,2466-2472.
    [86]解锡国,金永生.彩信端到端成功率提升策略研究.移动通信.2008,32(24)53-57.
    [87]孙国峰.彩信通知消息结构和下发流程优化:中国通信学会无线及移动通信委员会、IP应用与增强电信技术委员会2007年度联合学术年会.乌鲁木齐:2007.
    [88]梁杰丽,叶梧,黄昭文,等.基于ARIMA模型的彩信业务量预测:中国通信学会通信理论与信号处理专业委员会2005年通信理论与信号处理年会.广西桂林:2005.
    [89]唐军.彩信业务典型问题的分析及优化方法的探讨.邮电设计技术.2010(12)38-42.
    [90]清华大学应用数学系概率统计教研室概率论与数理统计.1987.
    [91]Lee W, Stolfo S J.Data mining approaches for intrusion detection. Defense Technical Information Center,2000.
    [92]Miloucheva I, Muller E, Anzaloni A. A practical approach to forecast Quality of Service parameters considering outliers:In Proc.1st Int. Workshop on Inter-Domain Performance and Simulation (IPS2003. Citeseer) 2003.
    [93]Julisch K.Clustering intrusion detection alarms to support root cause analysis. ACM Transactions on Information and System Security (TISSEC). 2003,6(4):443-471.
    [94]Miloucheva I, Hofmann U, Gutierrez P A.Spatio-temporal QoS pattern analysis in large scale internet environment//Interactive Multimedia on Next Generation Networks.Springer,2003:282-293.
    [95]Abusina Z U M, Zabir S M S, Ashir A, et al.An engineering approach to dynamic prediction of network performance from application logs. International Journal of Network Management.2005,15(3):151-162.
    [96]Lakhina A, Crovella M, Diot C.Mining anomalies using traffic feature distributions:ACM SIGCOMM Computer Communication Review. ACM,2005: 35,217-228.
    [97]孙红杰,方滨兴,张宏莉.一种新的大规模网络主动预警方法.电信科学.2007,23(01):74-78.
    [98]Hernandez Suarez C A, Salcedo Parra O J, Escobar Diaz A. An AR1MA model for forecasting Wi-Fi data network traffic values. Ingenieria e Investigacion. 2009,29(2):65-69.
    [99]Ferguson P, Huston G.Quality of service:delivering QoS on the Internet and in corporate networks. Wiley New York,1998.
    [100]Jolliffe IT.Principal component analysis. Springer-Verlag New York,1986.
    [101]Koutroumbas S T K.Pattern Recognition, Fourth Edition 2008:408-445.
    [102]Tan Pang Ning, Steinbach Michael, Kumar Vipin.数据挖掘导论.北京:人民邮电出版社,2006.
    [103]Katsavounidis I, Jay Kuo C, Zhang Z.A new initialization technique for generalized Lloyd iteration. Signal Processing Letters, IEEE. 1994,1(10):144-146.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700