2018
DOI: 10.1109/access.2018.2833107
|View full text |Cite
|
Sign up to set email alerts
|

General TCP State Inference Model From Passive Measurements Using Machine Learning Techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
16
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 22 publications
(18 citation statements)
references
References 31 publications
0
16
0
Order By: Relevance
“…Passive measurement methodology is a technique of tracking the behavior and characteristics of packet streams where the network is not influenced by injecting extra traffic. More details on the two types of network measurement technique categories (i.e., active and passive) are briefly described in [12]. The RTT seen by a TCP segment is defined as the time a sender waits until it receives a corresponding ACK from the receiver before it sends more data packets.…”
Section: B Passive Rtt Monitoring Methodology and Trace Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…Passive measurement methodology is a technique of tracking the behavior and characteristics of packet streams where the network is not influenced by injecting extra traffic. More details on the two types of network measurement technique categories (i.e., active and passive) are briefly described in [12]. The RTT seen by a TCP segment is defined as the time a sender waits until it receives a corresponding ACK from the receiver before it sends more data packets.…”
Section: B Passive Rtt Monitoring Methodology and Trace Analysismentioning
confidence: 99%
“…The background traffic for all our experiments are generated using the iperf [8], an open source TCP streaming benchmark, traffic generator on an emulated LAN link where we run each TCP variant by adding a configurable variation of the emulation parameters bandwidth (in Mbit/s), delay (in ms), jitter (in ms) and packet loss (%) within a flow. The values of configuration parameters of the emulator for our samples collection are presented in Table I. The cross-traffic variability and verification of the popular Linux-based network emulator we used, Network Emulator (NetEm) [14], are thoroughly addressed in [12]. Verification of the Emulator: Given that the software emulator is not precise, we can ask: can we trust the network emulator for all the variations of bandwidth, delay, jitter and packet loss values introduced by the emulator irrespective of the measurement we get from TCP stream?…”
Section: B Passive Rtt Monitoring Methodology and Trace Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…The important part of TCP identification is to construct the probability function. The previous methods infer the back-off factor β for the identification of TCP algorithms [13]. For example, the β of Cubic is 0.7 [2], for Reno is 0.5.…”
Section: Problem Formulationmentioning
confidence: 99%
“…According to the way of data collection, TCP identification can be mainly divided into two categories, namely active detection and passive measurement, where the former relies on observing the behaviors of injected redundant packets and passive measurement relies on the observations at intermediate nodes, without affecting the current network traffic. The passive measurement has minimum effects on network which is more practical than active detection, so is commonly used in recent work [6], [12], [13].…”
Section: Introductionmentioning
confidence: 99%