期刊文献+
共找到104篇文章
< 1 2 6 >
每页显示 20 50 100
Correlation dimension based nonlinear analysis of network traffics with different application protocols 被引量:1
1
作者 王俊松 袁静 +1 位作者 李强 袁睿翕 《Chinese Physics B》 SCIE EI CAS CSCD 2011年第5期174-178,共5页
This paper uses a correlation dimension based nonlinear analysis approach to analyse the dynamics of network traffics with three different application protocols-HTTP, FTP and SMTP. First, the phase space is reconstruc... This paper uses a correlation dimension based nonlinear analysis approach to analyse the dynamics of network traffics with three different application protocols-HTTP, FTP and SMTP. First, the phase space is reconstructed and the embedding parameters are obtained by the mutual information method. Secondly, the correlation dimensions of three different traffics are calculated and the results of analysis have demonstrated that the dynamics of the three different application protocol traffics is different from each other in nature, i.e. HTTP and FTP traffics are chaotic, furthermore, the former is more complex than the later; on the other hand, SMTP traffic is stochastic. It is shown that correlation dimension approach is an efficient method to understand and to characterize the nonlinear dynamics of HTTP, FTP and SMTP protocol network traffics. This analysis provided insight into and a more accurate understanding of nonlinear dynamics of internet traffics which have a complex mixture of chaotic and stochastic components. 展开更多
关键词 application protocol network traffic correlation dimension CHAOS
原文传递
Multi-Head Attention Enhanced Parallel Dilated Convolution and Residual Learning for Network Traffic Anomaly Detection
2
作者 Guorong Qi Jian Mao +2 位作者 Kai Huang Zhengxian You Jinliang Lin 《Computers, Materials & Continua》 2025年第2期2159-2176,共18页
Abnormal network traffic, as a frequent security risk, requires a series of techniques to categorize and detect it. Existing network traffic anomaly detection still faces challenges: the inability to fully extract loc... Abnormal network traffic, as a frequent security risk, requires a series of techniques to categorize and detect it. Existing network traffic anomaly detection still faces challenges: the inability to fully extract local and global features, as well as the lack of effective mechanisms to capture complex interactions between features;Additionally, when increasing the receptive field to obtain deeper feature representations, the reliance on increasing network depth leads to a significant increase in computational resource consumption, affecting the efficiency and performance of detection. Based on these issues, firstly, this paper proposes a network traffic anomaly detection model based on parallel dilated convolution and residual learning (Res-PDC). To better explore the interactive relationships between features, the traffic samples are converted into two-dimensional matrix. A module combining parallel dilated convolutions and residual learning (res-pdc) was designed to extract local and global features of traffic at different scales. By utilizing res-pdc modules with different dilation rates, we can effectively capture spatial features at different scales and explore feature dependencies spanning wider regions without increasing computational resources. Secondly, to focus and integrate the information in different feature subspaces, further enhance and extract the interactions among the features, multi-head attention is added to Res-PDC, resulting in the final model: multi-head attention enhanced parallel dilated convolution and residual learning (MHA-Res-PDC) for network traffic anomaly detection. Finally, comparisons with other machine learning and deep learning algorithms are conducted on the NSL-KDD and CIC-IDS-2018 datasets. The experimental results demonstrate that the proposed method in this paper can effectively improve the detection performance. 展开更多
关键词 network traffic anomaly detection multi-head attention parallel dilated convolution residual learning
在线阅读 下载PDF
NetST:Network Encrypted Traffic Classification Based on Swin Transformer
3
作者 Jianwei Zhang Hongying Zhao +2 位作者 Yuan Feng Zengyu Cai Liang Zhu 《Computers, Materials & Continua》 2025年第9期5279-5298,共20页
Network traffic classification is a crucial research area aimed at improving quality of service,simplifying network management,and enhancing network security.To address the growing complexity of cryptography,researche... Network traffic classification is a crucial research area aimed at improving quality of service,simplifying network management,and enhancing network security.To address the growing complexity of cryptography,researchers have proposed various machine learning and deep learning approaches to tackle this challenge.However,existing mainstream methods face several general issues.On one hand,the widely used Transformer architecture exhibits high computational complexity,which negatively impacts its efficiency.On the other hand,traditional methods are often unreliable in traffic representation,frequently losing important byte information while retaining unnecessary biases.To address these problems,this paper introduces the Swin Transformer architecture into the domain of network traffic classification and proposes the NetST(Network Swin Transformer)model.This model improves the Swin Transformer to better accommodate the characteristics of network traffic,effectively addressing efficiency issues.Furthermore,this paper presents a traffic representation scheme designed to extract meaningful information from large volumes of traffic while minimizing bias.We integrate four datasets relevant to network traffic classification for our experiments,and the results demonstrate that NetST achieves a high accuracy rate while maintaining low memory usage. 展开更多
关键词 Traffic classification encrypted network traffic Swin Transformer network management deep learning
在线阅读 下载PDF
DMF: A Deep Multimodal Fusion-Based Network Traffic Classification Model
4
作者 Xiangbin Wang Qingjun Yuan +3 位作者 Weina Niu Qianwei Meng Yongjuan Wang Chunxiang Gu 《Computers, Materials & Continua》 2025年第5期2267-2285,共19页
With the rise of encrypted traffic,traditional network analysis methods have become less effective,leading to a shift towards deep learning-based approaches.Among these,multimodal learning-based classification methods... With the rise of encrypted traffic,traditional network analysis methods have become less effective,leading to a shift towards deep learning-based approaches.Among these,multimodal learning-based classification methods have gained attention due to their ability to leverage diverse feature sets from encrypted traffic,improving classification accuracy.However,existing research predominantly relies on late fusion techniques,which hinder the full utilization of deep features within the data.To address this limitation,we propose a novel multimodal encrypted traffic classification model that synchronizes modality fusion with multiscale feature extraction.Specifically,our approach performs real-time fusion of modalities at each stage of feature extraction,enhancing feature representation at each level and preserving inter-level correlations for more effective learning.This continuous fusion strategy improves the model’s ability to detect subtle variations in encrypted traffic,while boosting its robustness and adaptability to evolving network conditions.Experimental results on two real-world encrypted traffic datasets demonstrate that our method achieves a classification accuracy of 98.23% and 97.63%,outperforming existing multimodal learning-based methods. 展开更多
关键词 Deep fusion intrusion detection multimodal learning network traffic classification
在线阅读 下载PDF
Toward Intrusion Detection of Industrial Cyber-Physical System: A Hybrid Approach Based on System State and Network Traffic Abnormality Monitoring
5
作者 Junbin He Wuxia Zhang +2 位作者 Xianyi Liu Jinping Liu Guangyi Yang 《Computers, Materials & Continua》 2025年第7期1227-1252,共26页
The integration of cloud computing into traditional industrial control systems is accelerating the evolution of Industrial Cyber-Physical System(ICPS),enhancing intelligence and autonomy.However,this transition also e... The integration of cloud computing into traditional industrial control systems is accelerating the evolution of Industrial Cyber-Physical System(ICPS),enhancing intelligence and autonomy.However,this transition also expands the attack surface,introducing critical security vulnerabilities.To address these challenges,this article proposes a hybrid intrusion detection scheme for securing ICPSs that combines system state anomaly and network traffic anomaly detection.Specifically,an improved variation-Bayesian-based noise covariance-adaptive nonlinear Kalman filtering(IVB-NCA-NLKF)method is developed to model nonlinear system dynamics,enabling optimal state estimation in multi-sensor ICPS environments.Intrusions within the physical sensing system are identified by analyzing residual discrepancies between predicted and observed system states.Simultaneously,an adaptive network traffic anomaly detection mechanism is introduced,leveraging learned traffic patterns to detect node-and network-level anomalies through pattern matching.Extensive experiments on a simulated network control system demonstrate that the proposed framework achieves higher detection accuracy(92.14%)with a reduced false alarm rate(0.81%).Moreover,it not only detects known attacks and vulnerabilities but also uncovers stealthy attacks that induce system state deviations,providing a robust and comprehensive security solution for the safety protection of ICPS. 展开更多
关键词 Industrial cyber-physical systems network intrusion detection adaptive Kalman filter abnormal state monitoring network traffic abnormality monitoring
在线阅读 下载PDF
Diff-IDS:A Network Intrusion Detection Model Based on Diffusion Model for Imbalanced Data Samples
6
作者 Yue Yang Xiangyan Tang +3 位作者 Zhaowu Liu Jieren Cheng Haozhe Fang Cunyi Zhang 《Computers, Materials & Continua》 2025年第3期4389-4408,共20页
With the rapid development of Internet of Things technology,the sharp increase in network devices and their inherent security vulnerabilities present a stark contrast,bringing unprecedented challenges to the field of ... With the rapid development of Internet of Things technology,the sharp increase in network devices and their inherent security vulnerabilities present a stark contrast,bringing unprecedented challenges to the field of network security,especially in identifying malicious attacks.However,due to the uneven distribution of network traffic data,particularly the imbalance between attack traffic and normal traffic,as well as the imbalance between minority class attacks and majority class attacks,traditional machine learning detection algorithms have significant limitations when dealing with sparse network traffic data.To effectively tackle this challenge,we have designed a lightweight intrusion detection model based on diffusion mechanisms,named Diff-IDS,with the core objective of enhancing the model’s efficiency in parsing complex network traffic features,thereby significantly improving its detection speed and training efficiency.The model begins by finely filtering network traffic features and converting them into grayscale images,while also employing image-flipping techniques for data augmentation.Subsequently,these preprocessed images are fed into a diffusion model based on the Unet architecture for training.Once the model is trained,we fix the weights of the Unet network and propose a feature enhancement algorithm based on feature masking to further boost the model’s expressiveness.Finally,we devise an end-to-end lightweight detection strategy to streamline the model,enabling efficient lightweight detection of imbalanced samples.Our method has been subjected to multiple experimental tests on renowned network intrusion detection benchmarks,including CICIDS 2017,KDD 99,and NSL-KDD.The experimental results indicate that Diff-IDS leads in terms of detection accuracy,training efficiency,and lightweight metrics compared to the current state-of-the-art models,demonstrating exceptional detection capabilities and robustness. 展开更多
关键词 network traffic feature enhancement diffusion model multi-classification Algorithm 2(continued)13:end for 14:Return y
在线阅读 下载PDF
Optimization method for evacuation zone with network reconfiguration based on dynamic simulation 被引量:1
7
作者 赵星 任刚 +1 位作者 张小丽 李岩 《Journal of Southeast University(English Edition)》 EI CAS 2016年第3期373-378,共6页
Abstract: With a determinate danger zone and evacuation demand caused by an emergency, an optimization method for the evacuation zone with network reconfiguration based on dynamic simulation is proposed. The method c... Abstract: With a determinate danger zone and evacuation demand caused by an emergency, an optimization method for the evacuation zone with network reconfiguration based on dynamic simulation is proposed. The method contains three modules. First, the network in the evacuation zone is optimized by a model with the integrated strategy of lane reversal and intersection conflict elimination. Secondly, the dynamic evacuation simulation model based on the cell transmission model is applied to simulate the dynamic propagation process of evacuated vehicles in the network in the evacuation zone. The evacuation time for all evacuated vehicles leaving the danger zone is obtained and the setting of the current evacuation zone is fed back. Thirdly, the arrival distributions of evacuated vehicles at critical intersections of the evacuation zone are also obtained to estimate the delay at critical intersection to determine whether the intersection should be taken as the critical intersection in the next iteration. The evacuation zone is expanded gradually through iteration, and the reasonable evacuation zone and the optimal evacuation network is confirmed. Based on the survey of the parking lot and urban street network around Nanjing Olympic Sports Center, the models and the iterative algorithm were applied to obtain the optimal plan of the evacuation zone with network reconfiguration in an evacuation situation to verify the validity of the proposed method. 展开更多
关键词 evacuation zone cell transmission model traffic network reconfiguration intersection delay
在线阅读 下载PDF
Detection of Abnormal Network Traffic Using Bidirectional Long Short-Term Memory
8
作者 Nga Nguyen Thi Thanh Quang H.Nguyen 《Computer Systems Science & Engineering》 SCIE EI 2023年第7期491-504,共14页
Nowadays,web systems and servers are constantly at great risk from cyberattacks.This paper proposes a novel approach to detecting abnormal network traffic using a bidirectional long short-term memory(LSTM)network in c... Nowadays,web systems and servers are constantly at great risk from cyberattacks.This paper proposes a novel approach to detecting abnormal network traffic using a bidirectional long short-term memory(LSTM)network in combination with the ensemble learning technique.First,the binary classification module was used to detect the current abnormal flow.Then,the abnormal flows were fed into the multilayer classification module to identify the specific type of flow.In this research,a deep learning bidirectional LSTM model,in combination with the convolutional neural network and attention technique,was deployed to identify a specific attack.To solve the real-time intrusion-detecting problem,a stacking ensemble-learning model was deployed to detect abnormal intrusion before being transferred to the attack classification module.The class-weight technique was applied to overcome the data imbalance between the attack layers.The results showed that our approach gained good performance and the F1 accuracy on the CICIDS2017 data set reached 99.97%,which is higher than the results obtained in other research. 展开更多
关键词 Intrusion detection systems abnormal network traffics bi-directional lstm convolutional neural network ensemble learning
在线阅读 下载PDF
Small-time scale network traffic prediction based on a local support vector machine regression model 被引量:10
9
作者 孟庆芳 陈月辉 彭玉华 《Chinese Physics B》 SCIE EI CAS CSCD 2009年第6期2194-2199,共6页
In this paper we apply the nonlinear time series analysis method to small-time scale traffic measurement data. The prediction-based method is used to determine the embedding dimension of the traffic data. Based on the... In this paper we apply the nonlinear time series analysis method to small-time scale traffic measurement data. The prediction-based method is used to determine the embedding dimension of the traffic data. Based on the reconstructed phase space, the local support vector machine prediction method is used to predict the traffic measurement data, and the BIC-based neighbouring point selection method is used to choose the number of the nearest neighbouring points for the local support vector machine regression model. The experimental results show that the local support vector machine prediction method whose neighbouring points are optimized can effectively predict the small-time scale traffic measurement data and can reproduce the statistical features of real traffic measurements. 展开更多
关键词 network traffic small-time scale nonlinear time series analysis support vector machine regression model
原文传递
Prediction Method for Network Traffic Based on Maximum Correntropy Criterion 被引量:5
10
作者 曲桦 马文涛 +1 位作者 赵季红 王涛 《China Communications》 SCIE CSCD 2013年第1期134-145,共12页
This paper proposes a method for improving the precision of Network Traffic Prediction based on the Maximum Correntropy Criterion(NTPMCC),where the nonlinear characteristics of network traffic are considered.This meth... This paper proposes a method for improving the precision of Network Traffic Prediction based on the Maximum Correntropy Criterion(NTPMCC),where the nonlinear characteristics of network traffic are considered.This method utilizes the MCC as a new error evaluation criterion or named the cost function(CF)to train neural networks(NN).MCC is based on a new similarity function(Generalized correlation entropy function,Correntropy),which has as its foundation the Parzen window evaluation and Renyi entropy of error probability density function.At the same time,by combining the MCC with the Mean Square Error(MSE),a mixed evaluation criterion with MCC and MSE is proposed as a cost function of NN training.According to the traffic network characteristics including the nonlinear,non-Gaussian,and mutation,the Elman neural network is trained by MCC and MCC-MSE,and then the trained neural network is used as the model for predicting network traffic.The simulation results based on the evaluation by Mean Absolute Error(MAE),MSE,and Sum Squared Error(SSE)show that the accuracy of the prediction based on MCC is superior to the results of the Elman neural network with MSE.The overall performance is improved by about 0.0131. 展开更多
关键词 MCC MSE Elman neural net-work network traffic prediction
在线阅读 下载PDF
Regional accessibility of land traffic network in the Yangtze River Delta 被引量:9
11
作者 ZHANG Li LU Yuqi 《Journal of Geographical Sciences》 SCIE CSCD 2007年第3期351-364,共14页
In a given district, the accessibility of any point should be the synthetically evaluation of the internal and external accessibilities. Using MapX component and Delphi, the author presents an information system to ca... In a given district, the accessibility of any point should be the synthetically evaluation of the internal and external accessibilities. Using MapX component and Delphi, the author presents an information system to calculate and analyze regional accessibility according to the shortest travel time, generating thus a mark diffusing figure. Based on land traffic network, this paper assesses the present and the future regional accessibilities of sixteen major cities in the Yangtze River Delta. The result shows that the regional accessibility of the Yangtze River Delta presents a fan with Shanghai as its core. The top two most accessible cities are Shanghai and Jiaxing, and the bottom two ones are Taizhou (Zhejiang province) and Nantong With the construction of Sutong Bridge, Hangzhouwan Bridge and Zhoushan Bridge, the regional internal accessibility of all cities will be improved. Especially for Shaoxing, Ningbo and Taizhou (Jiangsu province), the regional internal accessibility will be decreased by one hour, and other cities will be shortened by about 25 minutes averagely. As the construction of Yangkou Harbor in Nantong, the regional external accessibility of the harbor cities in Jiangsu province will be speeded up by about one hour. 展开更多
关键词 regional accessibility land traffic network Yangtze River Delta GIS
在线阅读 下载PDF
An Intrusion Alarming System Based on Self-Similarity of Network Traffic 被引量:4
12
作者 YUFei ZHUMiao-liang +2 位作者 CHENYu-feng LIRen-fa XUCheng 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期169-173,共5页
Intrusion detection system ean make effective alarm for illegality of networkusers, which is absolutely necessarily and important to build security environment of communicationbase service According to the principle t... Intrusion detection system ean make effective alarm for illegality of networkusers, which is absolutely necessarily and important to build security environment of communicationbase service According to the principle that the number of network traffic can affect the degree ofself-similar traffic, the paper investigates the variety of self-similarity resulted fromunconventional network traffic. A network traffic model based on normal behaviors of user isproposed and the Hursl parameter of this model can be calculated. By comparing the Hurst parameterof normal traffic and the self-similar parameter, we ean judge whether the network is normal or notand alarm in time. 展开更多
关键词 intrusion detection SELF-SIMILARITY network traffic model: networkprocessor
在线阅读 下载PDF
Network Traffic Clustering with QoS-Awareness 被引量:2
13
作者 Jielun Zhang Fuhao Li Feng Ye 《China Communications》 SCIE CSCD 2022年第3期202-214,共13页
Network traffic classification is essential in supporting network measurement and management.Many existing traffic classification approaches provide application-level results regardless of the network quality of servi... Network traffic classification is essential in supporting network measurement and management.Many existing traffic classification approaches provide application-level results regardless of the network quality of service(QoS)requirements.In practice,traffic flows from the same application may have irregular network behaviors that should be identified to various QoS classes for best network resource management.To address the issues,we propose to conduct traffic classification with two newly defined QoSaware features,i.e.,inter-APP similarity and intraAPP diversity.The inter-APP similarity represents the close QoS association between the traffic flows that originate from the different Internet applications.The intra-APP diversity describes the QoS variety of the traffic even among those originated from the same Internet application.The core of performing the QoS-aware feature extraction is a Long-Short Term Memory neural network based Autoencoder(LSTMAE).The QoS-aware features extracted by the encoder part of the LSTM-AE are then clustered into the corresponding QoS classes.Real-life data from multiple applications are collected to evaluate the proposed QoS-aware network traffic classification approach.The evaluation results demonstrate the efficacy of the extracted QoS-aware features in supporting the traffic classification,which can further contribute to future network measurement and management. 展开更多
关键词 network traffic clustering QUALITY-OF-SERVICE quality-of-experience deep learning
在线阅读 下载PDF
Applying an Improved Dung Beetle Optimizer Algorithm to Network Traffic Identification 被引量:3
14
作者 Qinyue Wu Hui Xu Mengran Liu 《Computers, Materials & Continua》 SCIE EI 2024年第3期4091-4107,共17页
Network traffic identification is critical for maintaining network security and further meeting various demands of network applications.However,network traffic data typically possesses high dimensionality and complexi... Network traffic identification is critical for maintaining network security and further meeting various demands of network applications.However,network traffic data typically possesses high dimensionality and complexity,leading to practical problems in traffic identification data analytics.Since the original Dung Beetle Optimizer(DBO)algorithm,Grey Wolf Optimization(GWO)algorithm,Whale Optimization Algorithm(WOA),and Particle Swarm Optimization(PSO)algorithm have the shortcomings of slow convergence and easily fall into the local optimal solution,an Improved Dung Beetle Optimizer(IDBO)algorithm is proposed for network traffic identification.Firstly,the Sobol sequence is utilized to initialize the dung beetle population,laying the foundation for finding the global optimal solution.Next,an integration of levy flight and golden sine strategy is suggested to give dung beetles a greater probability of exploring unvisited areas,escaping from the local optimal solution,and converging more effectively towards a global optimal solution.Finally,an adaptive weight factor is utilized to enhance the search capabilities of the original DBO algorithm and accelerate convergence.With the improvements above,the proposed IDBO algorithm is then applied to traffic identification data analytics and feature selection,as so to find the optimal subset for K-Nearest Neighbor(KNN)classification.The simulation experiments use the CICIDS2017 dataset to verify the effectiveness of the proposed IDBO algorithm and compare it with the original DBO,GWO,WOA,and PSO algorithms.The experimental results show that,compared with other algorithms,the accuracy and recall are improved by 1.53%and 0.88%in binary classification,and the Distributed Denial of Service(DDoS)class identification is the most effective in multi-classification,with an improvement of 5.80%and 0.33%for accuracy and recall,respectively.Therefore,the proposed IDBO algorithm is effective in increasing the efficiency of traffic identification and solving the problem of the original DBO algorithm that converges slowly and falls into the local optimal solution when dealing with high-dimensional data analytics and feature selection for network traffic identification. 展开更多
关键词 network security network traffic identification data analytics feature selection dung beetle optimizer
在线阅读 下载PDF
A Network Traffic Classification Model Based on Metric Learning 被引量:3
15
作者 Mo Chen Xiaojuan Wang +3 位作者 Mingshu He Lei Jin Khalid Javeed Xiaojun Wang 《Computers, Materials & Continua》 SCIE EI 2020年第8期941-959,共19页
Attacks on websites and network servers are among the most critical threats in network security.Network behavior identification is one of the most effective ways to identify malicious network intrusions.Analyzing abno... Attacks on websites and network servers are among the most critical threats in network security.Network behavior identification is one of the most effective ways to identify malicious network intrusions.Analyzing abnormal network traffic patterns and traffic classification based on labeled network traffic data are among the most effective approaches for network behavior identification.Traditional methods for network traffic classification utilize algorithms such as Naive Bayes,Decision Tree and XGBoost.However,network traffic classification,which is required for network behavior identification,generally suffers from the problem of low accuracy even with the recently proposed deep learning models.To improve network traffic classification accuracy thus improving network intrusion detection rate,this paper proposes a new network traffic classification model,called ArcMargin,which incorporates metric learning into a convolutional neural network(CNN)to make the CNN model more discriminative.ArcMargin maps network traffic samples from the same category more closely while samples from different categories are mapped as far apart as possible.The metric learning regularization feature is called additive angular margin loss,and it is embedded in the object function of traditional CNN models.The proposed ArcMargin model is validated with three datasets and is compared with several other related algorithms.According to a set of classification indicators,the ArcMargin model is proofed to have better performances in both network traffic classification tasks and open-set tasks.Moreover,in open-set tasks,the ArcMargin model can cluster unknown data classes that do not exist in the previous training dataset. 展开更多
关键词 Metric learning ArcMargin network traffic classification CNNS
在线阅读 下载PDF
Network Intrusion Traffic Detection Based on Feature Extraction 被引量:3
16
作者 Xuecheng Yu Yan Huang +2 位作者 Yu Zhang Mingyang Song Zhenhong Jia 《Computers, Materials & Continua》 SCIE EI 2024年第1期473-492,共20页
With the increasing dimensionality of network traffic,extracting effective traffic features and improving the identification accuracy of different intrusion traffic have become critical in intrusion detection systems(... With the increasing dimensionality of network traffic,extracting effective traffic features and improving the identification accuracy of different intrusion traffic have become critical in intrusion detection systems(IDS).However,both unsupervised and semisupervised anomalous traffic detection methods suffer from the drawback of ignoring potential correlations between features,resulting in an analysis that is not an optimal set.Therefore,in order to extract more representative traffic features as well as to improve the accuracy of traffic identification,this paper proposes a feature dimensionality reduction method combining principal component analysis and Hotelling’s T^(2) and a multilayer convolutional bidirectional long short-term memory(MSC_BiLSTM)classifier model for network traffic intrusion detection.This method reduces the parameters and redundancy of the model by feature extraction and extracts the dependent features between the data by a bidirectional long short-term memory(BiLSTM)network,which fully considers the influence between the before and after features.The network traffic is first characteristically downscaled by principal component analysis(PCA),and then the downscaled principal components are used as input to Hotelling’s T^(2) to compare the differences between groups.For datasets with outliers,Hotelling’s T^(2) can help identify the groups where the outliers are located and quantitatively measure the extent of the outliers.Finally,a multilayer convolutional neural network and a BiLSTM network are used to extract the spatial and temporal features of network traffic data.The empirical consequences exhibit that the suggested approach in this manuscript attains superior outcomes in precision,recall and F1-score juxtaposed with the prevailing techniques.The results show that the intrusion detection accuracy,precision,and F1-score of the proposed MSC_BiLSTM model for the CIC-IDS 2017 dataset are 98.71%,95.97%,and 90.22%. 展开更多
关键词 network intrusion traffic detection PCA Hotelling’s T^(2) BiLSTM
在线阅读 下载PDF
ON THE TESTING FOR ALPHA-STABLE DISTRIBUTIONS OF ETHERNET NETWORK TRAFFIC 被引量:3
17
作者 Ge Xiaohu Zhu Guanxi Zhu Yaoting (Electron. & Info. Eng. Dept., Huazhong Univ. of Sci. & Tech., Wuhan 430074) 《Journal of Electronics(China)》 2003年第4期309-312,共4页
The modeling of network traffic is important for the design and application of networks, but little is known as to the characteristics of distribution of packets in network traffic. In this letter the distribution of ... The modeling of network traffic is important for the design and application of networks, but little is known as to the characteristics of distribution of packets in network traffic. In this letter the distribution of packets in network traffic is explored. 展开更多
关键词 Alpha-stable distributions SELF-SIMILAR Maximum likelihood method network traffic
在线阅读 下载PDF
Effects of real-time traffic information systems on traffic performance under different network structures 被引量:3
18
作者 YAO Xue-heng F.Benjamin ZHAN +1 位作者 LU Yong-mei YANG Min-hua 《Journal of Central South University》 SCIE EI CAS 2012年第2期586-592,共7页
The effects of real-time traffic information system(RTTIS)on traffic performance under parallel,grid and ring networks were investigated.The simulation results show that the effects of the proportion of RTTIS usage de... The effects of real-time traffic information system(RTTIS)on traffic performance under parallel,grid and ring networks were investigated.The simulation results show that the effects of the proportion of RTTIS usage depend on the road network structures.For traffic on a parallel network,the performance of groups with and without RTTIS level is improved when the proportion of vehicles using RTTIS is greater than 0 and less than 30%,and a proportion of RTTIS usage higher than 90%would actually deteriorate the performance.For both grid and ring networks,a higher proportion of RTTIS usage always improves the performance of groups with and without RTTIS.For all three network structures,vehicles without RTTIS benefit from some proportion of RTTIS usage in a system. 展开更多
关键词 real-time traffic information traffic network traffic efficiency optimization of urban traffic
在线阅读 下载PDF
RESEARCH ON FRACTAL CHARACTERISTICS OF URBAN TRAFFIC NETWORK STRUCTURE BASED ON GIS 被引量:2
19
作者 LI Jiang,WANG Xiao-yan,GUO Qing-sh eng(School of Resources and Environment al Sciences,Wuhan University,Wuhan 430079,P.R.China) 《Chinese Geographical Science》 SCIE CSCD 2002年第4期346-349,共4页
Traffic network is an importance asp ect of researching controllable parameters of an urban spatial morpholo-gy.Based on GIS,traffic network str ucture complexity can be understood by using fractal geometry in which t... Traffic network is an importance asp ect of researching controllable parameters of an urban spatial morpholo-gy.Based on GIS,traffic network str ucture complexity can be understood by using fractal geometry in which th e length-radius dimension describes change of network density,and ramification-radius dimension describes complexity and accessibility of urban network.It i s propitious to analyze urban traffic network and to understand dynamic c hange process of traffic network using expanding f ractal-dimension quantification.Meanwhile the length-radius dimension and ramifica-tion-radius dimension could be rega rd as reference factor of quantitative describing urban traffic network. 展开更多
关键词 urban traffic network expanding fractal dimension CHARACTERISTICS GIS
在线阅读 下载PDF
Network traffic prediction by a wavelet-based combined model 被引量:1
20
作者 孙韩林 金跃辉 +1 位作者 崔毅东 程时端 《Chinese Physics B》 SCIE EI CAS CSCD 2009年第11期4760-4768,共9页
Network traffic prediction models can be grouped into two types, single models and combined ones. Combined models integrate several single models and thus can improve prediction accuracy. Based on wavelet transform, g... Network traffic prediction models can be grouped into two types, single models and combined ones. Combined models integrate several single models and thus can improve prediction accuracy. Based on wavelet transform, grey theory, and chaos theory, this paper proposes a novel combined model, wavelet-grey-chaos (WGC), for network traffic prediction. In the WGC model, we develop a time series decomposition method without the boundary problem by modifying the standard à trous algorithm, decompose the network traffic into two parts, the residual part and the burst part to alleviate the accumulated error problem, and employ the grey model GM(1,1) and chaos model to predict the residual part and the burst part respectively. Simulation results on real network traffic show that the WGC model does improve prediction accuracy. 展开更多
关键词 network traffic prediction wavelet transform grey model chaos model
原文传递
上一页 1 2 6 下一页 到第
使用帮助 返回顶部