Fast optimization method: the window size and hurst parameter estimator on self-similar network traffic

被引:0
作者
Idris, Mohd. Yazid [1 ]
Abdullah, Abdul Hanan [1 ]
Maarof, Mohd. Aizaini [1 ]
机构
[1] Univ Teknol Malaysia, Fac Comp Sci & Informat Syst, Skudai 81310, Johor, Malaysia
关键词
Optimization method; hurst parameter; window size; CPU time; network traffic;
D O I
10.1080/02522667.2007.10699750
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
This paper describes a version of the Fast Optimization Method (FOM) used to estimate the Hurst parameter (H) with appropriate window sizes in self-similar network traffic. Large or short window sizes, for example, may cause the results to become unreliable. Estimating window sizes requires that the estimation process be repeated, such as in Iterative Optimization Method (IOM) and will result in the high consumption of CPU time. This paper empirically compares the CPU time and the estimation results using both the FOM and IOM methods. Finally, it shows that the FOM outperforms the IOM in that it significantly reduces total CPU time and maintains the reliability of the estimation results.
引用
收藏
页码:409 / 420
页数:12
相关论文
共 17 条
[1]   Wavelet analysis of long-range-dependent traffic [J].
Abry, P ;
Veitch, D .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1998, 44 (01) :2-15
[2]  
Beran Jan, 1992, STAT SCI, V7, P404, DOI DOI 10.1214/SS/1177011122
[3]   Self-similar and fractal nature of Internet traffic [J].
Chakraborty, Debasish ;
Ashir, Ahmed ;
Suganuma, Takuo ;
Mansfield Keeni, G. ;
Roy, T.K. ;
Shiratori, N. .
International Journal of Network Management, 2004, 14 (02) :119-129
[4]   Self-similarity in World Wide Web traffic: Evidence and possible causes [J].
Crovella, ME ;
Bestavros, A .
IEEE-ACM TRANSACTIONS ON NETWORKING, 1997, 5 (06) :835-846
[5]  
Haines J. W., 2001, MIT LINCOLN LAB TECH
[6]  
Idris M. Y., 2004, INT J COMPUTING INFO, V2, P83
[7]  
Kettani H, 2002, CONF LOCAL COMPUT NE, P160, DOI 10.1109/LCN.2002.1181780
[8]  
KETTANI H., 2002, THESIS
[9]   ON THE SELF-SIMILAR NATURE OF ETHERNET TRAFFIC (EXTENDED VERSION) [J].
LELAND, WE ;
TAQQU, MS ;
WILLINGER, W ;
WILSON, DV .
IEEE-ACM TRANSACTIONS ON NETWORKING, 1994, 2 (01) :1-15
[10]   An approach to reliably identifying signs of DDOS flood attacks based on LRD traffic pattern recognition [J].
Li, M .
COMPUTERS & SECURITY, 2004, 23 (07) :549-558