scholarly journals Comparative evaluation of ARIMA and ANFIS for modeling of wireless network traffic time series

Author(s):  
Rajnish K Yadav ◽  
Manoj Balakrishnan
2015 ◽  
Vol 713-715 ◽  
pp. 1564-1569
Author(s):  
Jin Long Fei ◽  
Wei Lin ◽  
Tao Han ◽  
Yue Fei Zhu

Current prediction models for network traffic cannot accurately depict the multi-properties of the Internet traffic. This paper proposes a wavelet-based hybrid model prediction method for network traffic called CLWT model and proposes a prediction method for traffic based on this model. The traffic time series can be rapidly decomposed respectively into approximate time series and detail time series with LF and HF response. The approximate time series predicts by making use of Least Squares Support Vector Machine and proceeds error calibration by using Generalized Recurrent Nerve Network. The detail time series predict it by making use of self-adaption chaotic prediction methods after the medium-soft threshold noise reduction. Finally the prediction value of time series is got by making use of promoting wavelet reconstitution. The effectiveness for the prediction methods mentioned in the paper has been validated by simulation experiment. High prediction accuracy is obtained compared with the existing methods.


2018 ◽  
Vol 44 ◽  
pp. 00052 ◽  
Author(s):  
Darya Lavrova ◽  
Pavel Semyanov ◽  
Anna Shtyrkina ◽  
Peter Zegzhda

Digital production integrates with all the areas of human activity including critical industries, therefore the task of detecting network attacks has a key priority in protecting digital manufacture systems. This article offers an approach for analysis of digital production security based on evaluation of a posteriori probability for change point in time-series, which are based on the change point coefficient values of digital wavelet-transform in the network traffic time-series. These time-series make it possible to consider the network traffic from several points of view at the same time, which plays an important role in the task of detecting network attacks. The attack methods vary significantly; therefore, in order to detect them it is necessary to monitor different values of various traffic parameters. The proposed method has demonstrated its efficiency in detecting network service denial attacks (SlowLoris and HTTP DoS) being realized at the application level.


2020 ◽  
Vol 102 (3) ◽  
pp. 1909-1923
Author(s):  
Yi Yin ◽  
Xi Wang ◽  
Qiang Li ◽  
Pengjian Shang ◽  
He Gao ◽  
...  

Author(s):  
Joseph P. Macker ◽  
Caleb Bowers ◽  
Sastry Kompella ◽  
Clement Kam ◽  
Jeffery W. Weston

Sign in / Sign up

Export Citation Format

Share Document