2011 IEEE International Conference on Communications (ICC) 2011
DOI: 10.1109/icc.2011.5962733
|View full text |Cite
|
Sign up to set email alerts
|

Internet Traffic Classification Using LPC Cepstrum

Abstract: Internet traffic volumes continue to increase rapidly with the spread of the broadband access and the increase in internet backbone capacities. Moreover, the applications provided over the internet have become more diverse. Adequately supporting the QoS requirements for these diverse applications requires measuring traffic volumes by application type(file transfer, broadcast and so on). Therefore, methods for classifying applications become extremely important for multi QoS environment. In some application tra… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
1
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 15 publications
(8 reference statements)
0
1
0
Order By: Relevance
“…In recent years, a number of researchers have studied about ways to classify traffic data into types of applications. These studies include a clustering technique based on swarm intelligence to classify accurately with small computational complexity [2], the classification technique with LPC (Linear Predictive Coding) cepstrum to reduce influence of capture time and environment [3], and the method of application identification based on characteristic change by encryption of traffic to classify the mixed traffic data of encrypted/normal communications [4].…”
mentioning
confidence: 99%
“…In recent years, a number of researchers have studied about ways to classify traffic data into types of applications. These studies include a clustering technique based on swarm intelligence to classify accurately with small computational complexity [2], the classification technique with LPC (Linear Predictive Coding) cepstrum to reduce influence of capture time and environment [3], and the method of application identification based on characteristic change by encryption of traffic to classify the mixed traffic data of encrypted/normal communications [4].…”
mentioning
confidence: 99%