Traffic self-similarity analysis and application of industrial internet

被引:4
|
作者
Li, Qianmu [1 ]
Wang, Shuo [1 ,4 ]
Liu, Yaozong [2 ]
Long, Huaqiu [2 ,4 ]
Jiang, Jian [1 ,3 ]
机构
[1] Nanjing Univ Sci & Technol, Sch Cyber Sci & Engn, Nanjing 210094, Peoples R China
[2] Wuyi Univ, Intelligent Mfg Dept, Jiangmen 529020, Peoples R China
[3] Jiangsu Zhongtian Technol Co Ltd, Nantong 226009, Peoples R China
[4] Nanjing Univ Sci & Technol, Jiangsu Grad Workstn, Nanjing Liancheng Technol Dev Co Ltd, Nanjing, Peoples R China
关键词
Industrial internet traffic; Self-similarity; Echo state network; Traffic prediction; EDGE;
D O I
10.1007/s11276-020-02420-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Industrial internet traffic prediction is not only an academic problem, but also a concern of industry and network performance department. Efficient prediction of industrial internet traffic is helpful for protocol design, traffic scheduling, detection of network attacks, etc. This paper proposes an industrial internet traffic prediction method based on the Echo State Network. In the first place this paper proves that the industrial internet traffic data are self-similar by means of the calculation of Hurst exponent of each traffic time series. It indicates that industrial internet traffic can be predicted utilizing nonlinear time series models. Then Echo State Network is applied for industrial internet traffic forecasting. Furthermore, to avoid the weak-conditioned problem, grid search algorithm is used to optimize the reservoir parameters and coefficients. The dataset this paper perform experiments on are large-scale industrial internet traffic data at different time scale. They come from Industrial Internet in three regions and are provided by ZTE Corporation. The result shows that our approach can predict industrial internet traffic efficiently, which is also a verification of the self-similarity analysis.
引用
收藏
页码:3571 / 3585
页数:15
相关论文
共 50 条
  • [21] Study of on-line measurement of traffic self-similarity
    Kaklauskas, Liudvikas
    Sakalauskas, Leonidas
    CENTRAL EUROPEAN JOURNAL OF OPERATIONS RESEARCH, 2013, 21 (01) : 63 - 84
  • [22] TCP's role in the propagation of self-similarity in the Internet
    Veres, A
    Kenesi, Z
    Molnár, S
    Vattay, G
    COMPUTER COMMUNICATIONS, 2003, 26 (08) : 899 - 913
  • [23] Critical behaviors and self-similarity in models of computer network traffic
    Nakayama, A
    PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2001, 293 (1-2) : 285 - 296
  • [24] An Intrusion Alarming System Based on Self-Similarity of Network Traffic
    YU Fei 1
    2. Computer and Communication Institute
    Wuhan University Journal of Natural Sciences, 2005, (01) : 169 - 173
  • [25] Self-Similarity and modeling of LTE/LTE-A data traffic
    Polaganga, Roopesh Kumar
    Liang, Qilian
    MEASUREMENT, 2015, 75 : 218 - 229
  • [26] Effect of ingress buffering on self-similarity of optical burst traffic
    Huang, R
    Záruba, GV
    OPTICOMM 2003: OPTICAL NETWORKING AND COMMUNICATIONS, 2003, 5285 : 302 - 311
  • [27] Ad hoc wireless network traffic - Self-similarity and forecasting
    Liang, QL
    IEEE COMMUNICATIONS LETTERS, 2002, 6 (07) : 297 - 299
  • [28] Analysis of Traffic Model and Self-similarity for QQ in 3G Mobile Networks
    Lu, He
    Yu, Cuibo
    Gou, Xuerong
    PROCEEDINGS OF 2011 INTERNATIONAL CONFERENCE ON ADVANCED INTELLIGENCE AND AWARENESS INTERNET, IET AIAI2011, 2011, : 131 - 135
  • [29] On the self-similarity of synthetic traffic for the evaluation of intrusion detection systems
    Allen, WH
    Marin, GA
    2003 SYMPOSIUM ON APPLICATIONS AND THE INTERNET, PROCEEDINGS, 2003, : 242 - 248
  • [30] Self-similarity Analysis on Human Backscattering in Radar
    He, Yuan
    Le Chevalier, Francois
    Yarovoy, Alexander G.
    2013 10TH EUROPEAN RADAR CONFERENCE (EURAD), 2013, : 81 - 84