Self-similarity Analysis and Application of Network Traffic

被引:0
|
作者
Xu, Yan [1 ]
Li, Qianmu [1 ,2 ]
Meng, Shunmei [1 ]
机构
[1] Nanjing Univ Sci & Technol, Sch Comp Sci & Engn, Nanjing, Peoples R China
[2] Wuyi Univ, Intelligent Mfg Dept, Wuyi, Peoples R China
来源
MOBILE COMPUTING, APPLICATIONS, AND SERVICES, MOBICASE 2019 | 2019年 / 290卷
关键词
Network traffic; Self-similarity; Echo State Network; PREDICTION;
D O I
10.1007/9.78-3-030-28468-8_9
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Network traffic prediction is not only an academic problem, but also a concern of industry and network performance department. Efficient prediction of network traffic is helpful for protocol design, traffic scheduling, detection of network attacks, etc. In this paper, we propose a network traffic prediction method based on the Echo State Network. In the first place we prove that the network traffic data are self-similar by means of the calculation of Hurst exponent of each traffic time series, which indicates that we can predict network traffic utilizing nonlinear time series models. Then Echo State Network is applied for network traffic forecasting. Furthermore, to avoid the weak-conditioned problem, grid search algorithm is used to optimize the reservoir parameters and coefficients. The dataset we perform experiments on are large-scale network traffic data at different time scale. They come from three provinces and are provided by ZTE Corporation. The result shows that our approach can predict network traffic efficiently, which is also a verification of the self-similarity analysis.
引用
收藏
页码:112 / 125
页数:14
相关论文
共 50 条
  • [31] On the self-similarity of synthetic traffic for the evaluation of intrusion detection systems
    Allen, WH
    Marin, GA
    2003 SYMPOSIUM ON APPLICATIONS AND THE INTERNET, PROCEEDINGS, 2003, : 242 - 248
  • [32] THE DYNAMICS OF INTERNET TRAFFIC: SELF-SIMILARITY, SELF-ORGANIZATION, AND COMPLEX PHENOMENA
    Smith, Reginald D.
    ADVANCES IN COMPLEX SYSTEMS, 2011, 14 (06): : 905 - 949
  • [33] Network Calculus Based on Priority in Self-Similarity Flow
    Li Qing-hua
    Cao Hong
    Wu Yu-feng
    Xia Zhuo-qun
    INTERNATIONAL JOURNAL OF APPLIED MATHEMATICS & STATISTICS, 2013, 43 (13): : 264 - 270
  • [34] Host identification based on self-similarity of network activity
    Huang, Lisheng
    Zhao, Guanling
    Li, Lu
    Zhang, Fengjun
    COMPUTER COMMUNICATIONS, 2022, 191 : 467 - 476
  • [35] Self-similarity and network perspective of the Chinese fund market
    Deng, Weibing
    Li, Wei
    Cai, Xu
    Wang, Qiuping A.
    PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2011, 390 (21-22) : 3826 - 3834
  • [36] Routing protocols source of self-similarity on a wireless network
    Ali, Danladi
    Yohanna, Michael
    Silikwa, W. N.
    ALEXANDRIA ENGINEERING JOURNAL, 2018, 57 (04) : 2279 - 2287
  • [37] Real-Time and Self-adaptive Method for Abnormal Traffic Detection Based on Self-similarity
    Xia, Zhengmin
    Lu, Songnian
    Li, Jianhua
    Ma, Jin
    WEB INFORMATION SYSTEMS AND MINING, PROCEEDINGS, 2009, 5854 : 383 - +
  • [38] Self-similarity Analysis on Human Backscattering in Radar
    He, Yuan
    Le Chevalier, Francois
    Yarovoy, Alexander G.
    2013 10TH EUROPEAN RADAR CONFERENCE (EURAD), 2013, : 81 - 84
  • [39] Generalized self-similarity
    Cabrelli, CA
    Molter, UM
    JOURNAL OF MATHEMATICAL ANALYSIS AND APPLICATIONS, 1999, 230 (01) : 251 - 260
  • [40] PHOG analysis of self-similarity in aesthetic images
    Amirshahi, Seyed Ali
    Koch, Michael
    Denzler, Joachim
    Redies, Christoph
    HUMAN VISION AND ELECTRONIC IMAGING XVII, 2012, 8291