Existing algorithms for estimating the model parameters of an explicit-duration hidden Markov model (HMM) usually require computations as large as O((MD/sup 2/ + M/sup 2/)T) or O(M/sup 2/ DT), where… (More)
HTTP flooding is an attack that uses enormous useless packets to jam a Web server. In this paper, we use hidden semi-Markov models (HSMM) to describe Web-browsing patterns and detect HTTP flooding… (More)
2006 International Conference on Communications…
2006
In this paper, we present a Web robot detection approach based on hidden Markov model (HMM). We use an HMM to describe robot access pattern and then detect robot based on the access model. We also… (More)
Network traffic classification plays an important role in various network activities. Due to the ineffectiveness of traditional port-based and payload-based methods, recent works proposed using… (More)
Location or mobility information of nodes, GPS information, load, link change rate, and routing information, etc., have been used for security purposes for wireless networks, such as intrusion… (More)
In recent years, Internet traffic classification using machine learning has become a new direction in network measurement. Because supervised clustering algorithm need accuracy of training sets and… (More)
This paper presents a method of clustering Web request bursts. We purpose a parametric hidden semi-Markov model (HSMM) to describe the process of request bursts. We also use an HSMM-based clustering… (More)
Green networking for data center network is becoming a critical issue due to the rapid growth of energy consumption. Most of existing green networking approaches are in a centralized-control manner,… (More)
The side information means the meta information of the documents can be used for the purpose of data mining applications like clustering, classification etc. Huge amount of meta-information is… (More)
Distributed denial of service (DDoS) attack is a continuous critical threat to the Internet. Derived from the low layers, new application-layer-based DDoS attacks utilizing legitimate HTTP requests… (More)