2016 IEEE/SICE International Symposium on System Integration (SII) 2016
DOI: 10.1109/sii.2016.7843994
|View full text |Cite
|
Sign up to set email alerts
|

P2P traffic classification using clustering technology

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 17 publications
0
5
0
Order By: Relevance
“…However, the evaluation was performed using only three P2P applications namely BitComment, BitTorrent, and uTorrent. Tseng et al [14] proposed a methodology to classify P2P traffic on the basis of aggregation clustering. A similar traffic flow was aggregated by determining the correlation between clusters through their distance ratio.…”
Section: Related Workmentioning
confidence: 99%
“…However, the evaluation was performed using only three P2P applications namely BitComment, BitTorrent, and uTorrent. Tseng et al [14] proposed a methodology to classify P2P traffic on the basis of aggregation clustering. A similar traffic flow was aggregated by determining the correlation between clusters through their distance ratio.…”
Section: Related Workmentioning
confidence: 99%
“…Jingling Phantom 4 Pro unmanned aerial vehicle and Raspberry Pi 3Model B with thermo-hygrostat sensors and cameras for augmented reality can be used as the devices and the gateways. The process of decision making is as shown in (6)(7)(8) (9). The network data would be gathered from the control plane and the ImP to the IeP as (6) (7).…”
Section: Evaluation In 5g Scenariosmentioning
confidence: 99%
“…The network data would be gathered from the control plane and the ImP to the IeP as (6) (7). The result of decision making would be propagated directly or indirectly from the LDMs on the IeP to the ILMs on the control plane as (8), and then to a set of network elements in multi-level containers on the ImP as (9). The decisions such as prefetching would be executed as (10) (11) (12) for delivering the top-k popularity objects as the local copies for Internet service in the distributed network elements with storage spaces.…”
Section: Evaluation In 5g Scenariosmentioning
confidence: 99%
See 1 more Smart Citation
“…For instance, they are the precursors to intrusion detection systems, which use anomaly detection [1], [2], [4]. Furthermore, traffic classification is also applied in network security applications, network management, traffic analysis [34] and quality of service enhancement in networks [3], [29]. The traditional method of classifying traffic includes the Port based approach and the Payload method.…”
Section: Introductionmentioning
confidence: 99%