Method for Network Traffic Generation based on User Behavior of Streaming Media

被引:0
|
作者
Zeng, Shuai [1 ]
Wang, Zhongying [1 ]
Zhao, Guofeng [1 ]
Gai, Shaocong [1 ]
Duan, Jie [1 ]
Zhang, Yi [1 ]
机构
[1] Chongqing Univ Posts & Telecommun, Sch Commun & Informat Engn, Chongqing 400065, Peoples R China
基金
中国国家自然科学基金;
关键词
traffic generator; traffic authenticity; streaming media; user behavior;
D O I
10.14257/ijfgcn.2016.9.12.19
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Existing traffic generation methods generate traffic by the flow generator structured and then sent data packets, which had two defects. Namely, the generated traffic is not enough authenticity, and the rate of flow is not high enough. For coping with the mentioned network traffic generation issues, based on user behavior of streaming media and streaming media server was presented. The test results show that comparing with DITG, the size of traffic produced by this method has been obviously improved, and its principle indicates that the flow is highly authentic. Rather than following the traditional thinking of sending packet by traffic generator itself, the proposed method provides an innovation scheme which decreases the difficulty of the realization of the traffic generator and has recommendable value for the researches and development of traffic generator.
引用
收藏
页码:205 / 219
页数:15
相关论文
共 50 条
  • [1] User Demand Behavior Based Adaptive Algorithm for Service Composition of Streaming Media
    Zhu, Liyue
    Yang, Jian
    Hu, Han
    Xi, Hongsheng
    [J]. 2009 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY APPLICATION, VOL 1, PROCEEDINGS, 2009, : 579 - 584
  • [2] QoE-aware traffic monitoring based on user behavior in video streaming services
    Laiche, Fatima
    Ben Letaifa, Asma
    Aguili, Taoufik
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (11):
  • [3] User Analysis and Traffic Prediction Method based on Behavior Slicing
    He, Xin
    Cao, Lijuan
    Jia, Yuwei
    Chao, Kun
    Wang, Miaoqiong
    Wang, Chao
    Wang, Yunyun
    Dong, Runsha
    Zhao, Zhenqiao
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 1605 - 1610
  • [4] User-specified adaptive scheduling in a streaming media network
    Hicks, M
    Nagarajan, A
    van Renesse, R
    [J]. 2003 IEEE CONFERENCE ON OPEN ARCHITECTURES AND NETWORK PROGRAMMING PROCEEDINGS, 2003, : 87 - 96
  • [5] Reliable Network Traffic Collection for Network Characterization and User Behavior
    Awad, Ali Ismail
    Ali, Hanafy Mahmud
    Hamed, Heshasm F. A.
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2013, 4 (02) : 275 - 279
  • [6] Research on the user behavior-based QoE evaluation method for HTTP mobile streaming
    Huang, Yajun
    Zhou, Wen'an
    Du, Yu
    [J]. 2014 NINTH INTERNATIONAL CONFERENCE ON BROADBAND AND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS (BWCCA), 2014, : 47 - 51
  • [7] A Distinction Method of Flooding DDoS and Flash Crowds Based on User Traffic Behavior
    Sun, Degang
    Yang, Kun
    Shi, Zhixin
    Wang, Yan
    [J]. 2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 65 - 72
  • [8] User based network (WAN) traffic analysis
    Dethe, CG
    Wakde, DG
    [J]. APCC 2003: 9TH ASIA-PACIFIC CONFERENCE ON COMMUNICATION, VOLS 1-3, PROCEEDINGS, 2003, : 1152 - 1156
  • [9] Analysis of telephone network traffic based on a complex user network
    Xia, YX
    Tse, CK
    Lau, FCM
    Tam, WM
    Small, M
    [J]. PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2006, 368 (02) : 583 - 594
  • [10] Prediction Method of User Behavior Label Based on the BP Neural Network
    Shen, Ruihang
    [J]. SCIENTIFIC PROGRAMMING, 2022, 2022