Profiling and identifying users' activities with network traffic analysis
2015 6th IEEE International Conference on Software Engineering and Service Science (ICSESS), 2015Traffic identification technique is used for classification of different network protocols and applications even with detection of users' network activities. In this paper, we conduct our study on some typical users' network activities and present a traffic identification method to describe the feature about users' behaviors.
Ma Tao, Ye Chun Ming, Chen Juan
openaire +1 more source
Application Traffic Activity Graph Analysis
2011Understanding and analyzing traffic characteristics are fundamental to the design, development and implementation of networks. The traditional emphasis of network traffic analysis has been on the statistical properties of traffic, leading to the important discoveries such as heavy-tails and long range dependence.
Yu Jin, Esam Sharafuddin, Zhi-Li Zhang
openaire +1 more source
Performance Analysis of RACH Procedure with Beta Traffic-Activated Machine-Type-Communication
2015 IEEE Global Communications Conference (GLOBECOM), 2014Machine-Type-Communication (MTC) is a keyenabler for a variety of novel smart systems, such as smartgrid, eHealth, Intelligent Transport System (ITS), and smart city,opening the area of the cyber physical systems. These systems mayrequire the use of a huge number of MTC devices, which will puta great pressure on the whole network, i.e.
Arouk, Osama +3 more
openaire +3 more sources
Analysis of Special Activity Airspace for Air Traffic Management
12th AIAA Aviation Technology, Integration, and Operations (ATIO) Conference and 14th AIAA/ISSMO Multidisciplinary Analysis and Optimization Conference, 2012In today’s system, air traffic management decisions are often made in the absence of realtime special activity airspace (SAA) status information. Hence, planned routes for flights often avoid the SAA when, in fact, the SAA is inactive at the time the flight is projected to cross the SAA.
Poornima Balakrishna, George Hunter
openaire +1 more source
BotMAD: Botnet malicious activity detector based on DNS traffic analysis
2016 2nd International Conference on Next Generation Computing Technologies (NGCT), 2016Botnet is a collection of infected computers i.e. collection of zombie PCs which are remotely controlled by a single person or a group so called botmaster. In the recent years, botnets are becoming stealthier in nature by implanting certain techniques to hide themselves such as fast flux or DGA algorithms to generate the domain names.
Pooja Sharma +2 more
openaire +1 more source
GMAD: Graph-based Malware Activity Detection by DNS traffic analysis
Computer Communications, 2014Malicious activities on the Internet are one of the most dangerous threats to Internet users and organizations. Malicious software controlled remotely is addressed as one of the most critical methods for executing the malicious activities. Since blocking domain names for command and control (C&C) of the malwares by analyzing their Domain Name System ...
Jehyun Lee, Heejo Lee
openaire +1 more source
Driver Behavior Analysis During ACC Activation and Deactivation in a Real Traffic Environment
IEEE Transactions on Intelligent Transportation Systems, 2010For the development of a traffic-simulation model to estimate the effect of adaptive cruise control (ACC) systems on traffic safety, throughput, and environment, data of a field operational test (FOT) were analyzed, in which vehicles were equipped with ACC and lane-departure warning (LDW) systems.
Pauwelussen, J., Feenstra, P.J.
openaire +2 more sources
Design and analysis of multi-level active queue management mechanisms for emergency traffic
Computer Communications, 2005Multiple average-multiple threshold (MAMT) active queue management (AQM) is proposed as a solution for providing available and dependable service to traffic from emergency users after disasters. MAMT is a simple but effective approach that can be applied at strategic network locations, where heavy congestion is anticipated.
Manali Joshi +3 more
openaire +1 more source
Simulation and Analysis of Large-Scale Activity Traffic Flow in Urban Road Networks
CICTP 2016, 2016Large scale activity is an important source of urban road network traffic congestion. In this paper, a cellular automaton model is proposed to simulate large scale activity traffic flow in urban two-way-four-lane network systems without signal control at intersections.
Junqing Shi, Sulan Li, Zhiqiang Li
openaire +1 more source
A Benchmarking Study on Stream Network Traffic Analysis Using Active Learning
2015Analyzing network activity as it occurs is an important task since it allows for the prevention of malicious activity on the host system and the network. In this work, we investigate the performance of different budgeting strategies, as well as an adaptive Artificial Neural Network to analyze the activities on streaming network traffic.
Jillian Morgan +2 more
openaire +1 more source

