2015
DOI: 10.1016/j.comcom.2014.03.026
|View full text |Cite
|
Sign up to set email alerts
|

Towards self adaptive network traffic classification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
43
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 69 publications
(43 citation statements)
references
References 19 publications
0
43
0
Order By: Relevance
“…The second type of profiling is called modelbased profiling [18][19][20][21][22][23], which provides the pre-defined instructions/functions tables associated with hardware energy consumptions. It can be further classified into high-level model [20,21] and low-level model [18,19,[23][24][25]. High-level model is employed to analyze the energy consumption of system-level or function-level on the target systems.…”
Section: Previous Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The second type of profiling is called modelbased profiling [18][19][20][21][22][23], which provides the pre-defined instructions/functions tables associated with hardware energy consumptions. It can be further classified into high-level model [20,21] and low-level model [18,19,[23][24][25]. High-level model is employed to analyze the energy consumption of system-level or function-level on the target systems.…”
Section: Previous Workmentioning
confidence: 99%
“…Linux [5,26,27,25] is an open-sourced OS developed by community and is suitable for client-server infrastructures. To the best of our knowledge, this is the first time that power consumption can be predicted by means of recognizing patterns from a series of system calls using machine-learning methods [11][12][13].…”
Section: Previous Workmentioning
confidence: 99%
“…Deep packet inspection methods, usually the most accurate, are based on inspection of the packets' payload. They rely on a database of previously known signatures that are associated to application protocols and search each packet for strings that match any of the signatures . Searching feature string by DPI is generally in the application layer, which is the load of TCP or UDP.…”
Section: Related Workmentioning
confidence: 99%
“…They rely on a database of previously known signatures that are associated to application protocols and search each packet for strings that match any of the signatures. 1,5,6 Searching feature string by DPI is generally in the application layer, which is the load of TCP or UDP. Nevertheless, the main drawbacks of DPI techniques are the following: (1) There are more and more nonstandard applications and private protocols without the open and available protocol specification.…”
Section: Based On Deep Packet Inspectionmentioning
confidence: 99%
See 1 more Smart Citation