SlideShare una empresa de Scribd logo
1 de 2
IEEE PROJECTS DEVELOPMENTS
WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING
PROJECTS AND TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET
PROJECTS, NS2 PROJECTS, MATLAB PROJECTS AND IPT TRAINING .
CELL: +91 8870791415
Mail to: finalyearprojects2all@gmail.com
Service Usage Classification with Encrypted Internet Traffic in Mobile Messaging Apps
Abstract
The rapid adoption of mobile messaging Apps has enabled us to collect massive amount
of encrypted Internet traffic of mobile messaging. The classification of this traffic into different
types of in-App service usages can help for intelligent network management, such as managing
network bandwidth budget and providing quality of services. Traditional approaches for
classification of Internet traffic rely on packet inspection, such as parsing HTTP headers.
However, messaging Apps are increasingly using secure protocols, such as HTTPS and SSL, to
transmit data. This imposes significant challenges on the performances of service usage
classification by packet inspection. To this end, in this paper, we investigate how to exploit
encrypted Internet traffic for classifying in-App usages. Specifically, we develop a system,
named CUMMA, for classifying service usages of mobile messaging Apps by jointly modeling
user behavioral patterns, network traffic characteristics and temporal dependencies. Along this
line, we first segment Internet traffic from traffic-flows into sessions with a number of dialogs in
a hierarchical way. Also, we extract the discriminative features of traffic data from two
perspectives: (i) packet length and (ii) time delay. Next, we learn a service usage predictor to
classify these segmented dialogs into single-type usages or outliers. In addition, we design a
clustering Hidden Markov Model (HMM) based method to detect mixed dialogs from outliers
and decompose mixed dialogs into sub-dialogs of single-type usage. Indeed, CUMMA enables
mobile analysts to identify service usages and analyze end-user in-App behaviors even for
encrypted Internet traffic. Finally, the extensive experiments on real-world messaging data
demonstrate the effectiveness and efficiency of the proposed method for service usage
classification.
System Specification
System Requirements:
IEEE PROJECTS DEVELOPMENTS
WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING
PROJECTS AND TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET
PROJECTS, NS2 PROJECTS, MATLAB PROJECTS AND IPT TRAINING .
CELL: +91 8870791415
Mail to: finalyearprojects2all@gmail.com
Hardware Requirements:
• System : Pentium IV 2.4 GHz.
• Hard Disk : 40 GB.
• Floppy Drive : 1.44 Mb.
• Monitor : 15 VGA Colour.
• Mouse : Logitech.
• Ram : 512 Mb.
Software Requirements:
• Operating system : - Windows 7. 32 bit
• Coding Language : C#.net 4.0
• Data Base : SQL Server 2008

Más contenido relacionado

La actualidad más candente

CCNA Discovery Networking for Home and Small Businesses - Chapter 6
CCNA Discovery Networking for Home and Small Businesses - Chapter 6CCNA Discovery Networking for Home and Small Businesses - Chapter 6
CCNA Discovery Networking for Home and Small Businesses - Chapter 6Tutorials Tips Tricks
 
efficient data query in intermittently-connected mobile ad hoc social networks
efficient data query in intermittently-connected mobile ad hoc social networksefficient data query in intermittently-connected mobile ad hoc social networks
efficient data query in intermittently-connected mobile ad hoc social networksswathi78
 
Improving the search mechanism for unstructured peer to-peer networks using t...
Improving the search mechanism for unstructured peer to-peer networks using t...Improving the search mechanism for unstructured peer to-peer networks using t...
Improving the search mechanism for unstructured peer to-peer networks using t...Aditya Kumar
 
Internet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detectionInternet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detectionGyan Prakash
 
A COMPARATIVE STUDY OF PROCESS MEDIATOR COMPONENTS THAT SUPPORT BEHAVIORAL IN...
A COMPARATIVE STUDY OF PROCESS MEDIATOR COMPONENTS THAT SUPPORT BEHAVIORAL IN...A COMPARATIVE STUDY OF PROCESS MEDIATOR COMPONENTS THAT SUPPORT BEHAVIORAL IN...
A COMPARATIVE STUDY OF PROCESS MEDIATOR COMPONENTS THAT SUPPORT BEHAVIORAL IN...ijwscjournal
 
Botnet communication patterns 2
Botnet communication patterns 2Botnet communication patterns 2
Botnet communication patterns 2killswitch4
 
Hybrid distributed application in banking transaction using remote method inv...
Hybrid distributed application in banking transaction using remote method inv...Hybrid distributed application in banking transaction using remote method inv...
Hybrid distributed application in banking transaction using remote method inv...TELKOMNIKA JOURNAL
 

La actualidad más candente (10)

CCNA Discovery Networking for Home and Small Businesses - Chapter 6
CCNA Discovery Networking for Home and Small Businesses - Chapter 6CCNA Discovery Networking for Home and Small Businesses - Chapter 6
CCNA Discovery Networking for Home and Small Businesses - Chapter 6
 
presentation_SB_v01
presentation_SB_v01presentation_SB_v01
presentation_SB_v01
 
Hou_Resume
Hou_ResumeHou_Resume
Hou_Resume
 
efficient data query in intermittently-connected mobile ad hoc social networks
efficient data query in intermittently-connected mobile ad hoc social networksefficient data query in intermittently-connected mobile ad hoc social networks
efficient data query in intermittently-connected mobile ad hoc social networks
 
Improving the search mechanism for unstructured peer to-peer networks using t...
Improving the search mechanism for unstructured peer to-peer networks using t...Improving the search mechanism for unstructured peer to-peer networks using t...
Improving the search mechanism for unstructured peer to-peer networks using t...
 
Internet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detectionInternet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detection
 
A COMPARATIVE STUDY OF PROCESS MEDIATOR COMPONENTS THAT SUPPORT BEHAVIORAL IN...
A COMPARATIVE STUDY OF PROCESS MEDIATOR COMPONENTS THAT SUPPORT BEHAVIORAL IN...A COMPARATIVE STUDY OF PROCESS MEDIATOR COMPONENTS THAT SUPPORT BEHAVIORAL IN...
A COMPARATIVE STUDY OF PROCESS MEDIATOR COMPONENTS THAT SUPPORT BEHAVIORAL IN...
 
Botnet communication patterns 2
Botnet communication patterns 2Botnet communication patterns 2
Botnet communication patterns 2
 
Hybrid distributed application in banking transaction using remote method inv...
Hybrid distributed application in banking transaction using remote method inv...Hybrid distributed application in banking transaction using remote method inv...
Hybrid distributed application in banking transaction using remote method inv...
 
3iemail
3iemail3iemail
3iemail
 

Similar a Stochastic load balancing for virtual resource management in datacenters

Final year IEEE 2016-2017 PROJECTS TITLES (IEEE 2016 papers) For ME,M.Tech,BE...
Final year IEEE 2016-2017 PROJECTS TITLES (IEEE 2016 papers) For ME,M.Tech,BE...Final year IEEE 2016-2017 PROJECTS TITLES (IEEE 2016 papers) For ME,M.Tech,BE...
Final year IEEE 2016-2017 PROJECTS TITLES (IEEE 2016 papers) For ME,M.Tech,BE...S3 Infotech IEEE Projects
 
About M2M standards and their possible extensions
About M2M standards and their possible extensionsAbout M2M standards and their possible extensions
About M2M standards and their possible extensionsColdbeans Software
 
Automated Traffic Classification And Application Identification Using Machine...
Automated Traffic Classification And Application Identification Using Machine...Automated Traffic Classification And Application Identification Using Machine...
Automated Traffic Classification And Application Identification Using Machine...Jennifer Daniel
 
Final Year Project IEEE 2015
Final Year Project IEEE 2015Final Year Project IEEE 2015
Final Year Project IEEE 2015TTA_TNagar
 
Final Year IEEE Project Titles 2015
Final Year IEEE Project Titles 2015Final Year IEEE Project Titles 2015
Final Year IEEE Project Titles 2015TTA_TNagar
 
Statistical Dissemination Control in Large Machine-to-Machine Communication N...
Statistical Dissemination Control in Large Machine-to-Machine Communication N...Statistical Dissemination Control in Large Machine-to-Machine Communication N...
Statistical Dissemination Control in Large Machine-to-Machine Communication N...kitechsolutions
 
Optimization and Evaluation of a Multimedia Streaming Service on Hybrid Telco...
Optimization and Evaluation of a Multimedia Streaming Service on Hybrid Telco...Optimization and Evaluation of a Multimedia Streaming Service on Hybrid Telco...
Optimization and Evaluation of a Multimedia Streaming Service on Hybrid Telco...ijccsa
 
LEARNING-BASED ORCHESTRATOR FOR INTELLIGENT SOFTWARE-DEFINED NETWORKING CONTR...
LEARNING-BASED ORCHESTRATOR FOR INTELLIGENT SOFTWARE-DEFINED NETWORKING CONTR...LEARNING-BASED ORCHESTRATOR FOR INTELLIGENT SOFTWARE-DEFINED NETWORKING CONTR...
LEARNING-BASED ORCHESTRATOR FOR INTELLIGENT SOFTWARE-DEFINED NETWORKING CONTR...ijseajournal
 
Learning-based Orchestrator for Intelligent Software-defined Networking Contr...
Learning-based Orchestrator for Intelligent Software-defined Networking Contr...Learning-based Orchestrator for Intelligent Software-defined Networking Contr...
Learning-based Orchestrator for Intelligent Software-defined Networking Contr...ijseajournal
 
Machine Learning 5G Federated Learning.pdf
Machine Learning 5G Federated Learning.pdfMachine Learning 5G Federated Learning.pdf
Machine Learning 5G Federated Learning.pdfadeyimikaipaye
 
Ncct Ieee Software Abstract Collection Volume 1 50+ Abst
Ncct   Ieee Software Abstract Collection Volume 1   50+ AbstNcct   Ieee Software Abstract Collection Volume 1   50+ Abst
Ncct Ieee Software Abstract Collection Volume 1 50+ Abstncct
 
A scalable server architecture for mobile presence services in social network...
A scalable server architecture for mobile presence services in social network...A scalable server architecture for mobile presence services in social network...
A scalable server architecture for mobile presence services in social network...IEEEFINALYEARPROJECTS
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...IEEEGLOBALSOFTTECHNOLOGIES
 
JAVA 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for mob...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for mob...JAVA 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for mob...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for mob...IEEEGLOBALSOFTTECHNOLOGIES
 
3 S W 2009 I E E E Abstracts Java, N C C T Chennai
3    S W   2009  I E E E  Abstracts    Java,  N C C T  Chennai3    S W   2009  I E E E  Abstracts    Java,  N C C T  Chennai
3 S W 2009 I E E E Abstracts Java, N C C T Chennaincct
 
Review paper on web service security
Review paper on web service securityReview paper on web service security
Review paper on web service securityEditor Jacotech
 
B E M E Projects M C A Projects B
B E  M E  Projects  M C A  Projects  BB E  M E  Projects  M C A  Projects  B
B E M E Projects M C A Projects Bncct
 
Ncct 2009 Ieee Java Projects
Ncct 2009 Ieee Java ProjectsNcct 2009 Ieee Java Projects
Ncct 2009 Ieee Java Projectsncct
 

Similar a Stochastic load balancing for virtual resource management in datacenters (20)

Final year IEEE 2016-2017 PROJECTS TITLES (IEEE 2016 papers) For ME,M.Tech,BE...
Final year IEEE 2016-2017 PROJECTS TITLES (IEEE 2016 papers) For ME,M.Tech,BE...Final year IEEE 2016-2017 PROJECTS TITLES (IEEE 2016 papers) For ME,M.Tech,BE...
Final year IEEE 2016-2017 PROJECTS TITLES (IEEE 2016 papers) For ME,M.Tech,BE...
 
About M2M Standards
About M2M StandardsAbout M2M Standards
About M2M Standards
 
About M2M standards and their possible extensions
About M2M standards and their possible extensionsAbout M2M standards and their possible extensions
About M2M standards and their possible extensions
 
MIQModel: Predictive Model for Mobile Internet
MIQModel: Predictive Model for Mobile InternetMIQModel: Predictive Model for Mobile Internet
MIQModel: Predictive Model for Mobile Internet
 
Automated Traffic Classification And Application Identification Using Machine...
Automated Traffic Classification And Application Identification Using Machine...Automated Traffic Classification And Application Identification Using Machine...
Automated Traffic Classification And Application Identification Using Machine...
 
Final Year Project IEEE 2015
Final Year Project IEEE 2015Final Year Project IEEE 2015
Final Year Project IEEE 2015
 
Final Year IEEE Project Titles 2015
Final Year IEEE Project Titles 2015Final Year IEEE Project Titles 2015
Final Year IEEE Project Titles 2015
 
Statistical Dissemination Control in Large Machine-to-Machine Communication N...
Statistical Dissemination Control in Large Machine-to-Machine Communication N...Statistical Dissemination Control in Large Machine-to-Machine Communication N...
Statistical Dissemination Control in Large Machine-to-Machine Communication N...
 
Optimization and Evaluation of a Multimedia Streaming Service on Hybrid Telco...
Optimization and Evaluation of a Multimedia Streaming Service on Hybrid Telco...Optimization and Evaluation of a Multimedia Streaming Service on Hybrid Telco...
Optimization and Evaluation of a Multimedia Streaming Service on Hybrid Telco...
 
LEARNING-BASED ORCHESTRATOR FOR INTELLIGENT SOFTWARE-DEFINED NETWORKING CONTR...
LEARNING-BASED ORCHESTRATOR FOR INTELLIGENT SOFTWARE-DEFINED NETWORKING CONTR...LEARNING-BASED ORCHESTRATOR FOR INTELLIGENT SOFTWARE-DEFINED NETWORKING CONTR...
LEARNING-BASED ORCHESTRATOR FOR INTELLIGENT SOFTWARE-DEFINED NETWORKING CONTR...
 
Learning-based Orchestrator for Intelligent Software-defined Networking Contr...
Learning-based Orchestrator for Intelligent Software-defined Networking Contr...Learning-based Orchestrator for Intelligent Software-defined Networking Contr...
Learning-based Orchestrator for Intelligent Software-defined Networking Contr...
 
Machine Learning 5G Federated Learning.pdf
Machine Learning 5G Federated Learning.pdfMachine Learning 5G Federated Learning.pdf
Machine Learning 5G Federated Learning.pdf
 
Ncct Ieee Software Abstract Collection Volume 1 50+ Abst
Ncct   Ieee Software Abstract Collection Volume 1   50+ AbstNcct   Ieee Software Abstract Collection Volume 1   50+ Abst
Ncct Ieee Software Abstract Collection Volume 1 50+ Abst
 
A scalable server architecture for mobile presence services in social network...
A scalable server architecture for mobile presence services in social network...A scalable server architecture for mobile presence services in social network...
A scalable server architecture for mobile presence services in social network...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
 
JAVA 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for mob...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for mob...JAVA 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for mob...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for mob...
 
3 S W 2009 I E E E Abstracts Java, N C C T Chennai
3    S W   2009  I E E E  Abstracts    Java,  N C C T  Chennai3    S W   2009  I E E E  Abstracts    Java,  N C C T  Chennai
3 S W 2009 I E E E Abstracts Java, N C C T Chennai
 
Review paper on web service security
Review paper on web service securityReview paper on web service security
Review paper on web service security
 
B E M E Projects M C A Projects B
B E  M E  Projects  M C A  Projects  BB E  M E  Projects  M C A  Projects  B
B E M E Projects M C A Projects B
 
Ncct 2009 Ieee Java Projects
Ncct 2009 Ieee Java ProjectsNcct 2009 Ieee Java Projects
Ncct 2009 Ieee Java Projects
 

Más de Finalyearprojects Toall

Video stream analysis in clouds an object detection and classification frame...
Video stream analysis in clouds  an object detection and classification frame...Video stream analysis in clouds  an object detection and classification frame...
Video stream analysis in clouds an object detection and classification frame...Finalyearprojects Toall
 
Unlicensed spectra fusion and interference coordination for lte systems
Unlicensed spectra fusion and interference coordination for lte systemsUnlicensed spectra fusion and interference coordination for lte systems
Unlicensed spectra fusion and interference coordination for lte systemsFinalyearprojects Toall
 
Text mining the contributors to rail accidents
Text mining the contributors to rail accidentsText mining the contributors to rail accidents
Text mining the contributors to rail accidentsFinalyearprojects Toall
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsFinalyearprojects Toall
 
On the performance impact of data access middleware for no sql data stores
On the performance impact of data access middleware for no sql data storesOn the performance impact of data access middleware for no sql data stores
On the performance impact of data access middleware for no sql data storesFinalyearprojects Toall
 
Minimizing radio resource usage for machine to-machine communications through...
Minimizing radio resource usage for machine to-machine communications through...Minimizing radio resource usage for machine to-machine communications through...
Minimizing radio resource usage for machine to-machine communications through...Finalyearprojects Toall
 
Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...Finalyearprojects Toall
 
Identity based private matching over outsourced encrypted datasets
Identity based private matching over outsourced encrypted datasetsIdentity based private matching over outsourced encrypted datasets
Identity based private matching over outsourced encrypted datasetsFinalyearprojects Toall
 
Follow me cloud-when cloud services follow mobile users
Follow me cloud-when cloud services follow mobile usersFollow me cloud-when cloud services follow mobile users
Follow me cloud-when cloud services follow mobile usersFinalyearprojects Toall
 
Follow me cloud-when cloud services follow mobile users
Follow me cloud-when cloud services follow mobile usersFollow me cloud-when cloud services follow mobile users
Follow me cloud-when cloud services follow mobile usersFinalyearprojects Toall
 
Distributed and fair beaconing rate adaptation for congestion control in vehi...
Distributed and fair beaconing rate adaptation for congestion control in vehi...Distributed and fair beaconing rate adaptation for congestion control in vehi...
Distributed and fair beaconing rate adaptation for congestion control in vehi...Finalyearprojects Toall
 
Assurance of security and privacy requirements for cloud deployment model
Assurance of security and privacy requirements for cloud deployment modelAssurance of security and privacy requirements for cloud deployment model
Assurance of security and privacy requirements for cloud deployment modelFinalyearprojects Toall
 
An optimization framework for mobile data collection in energy harvesting wir...
An optimization framework for mobile data collection in energy harvesting wir...An optimization framework for mobile data collection in energy harvesting wir...
An optimization framework for mobile data collection in energy harvesting wir...Finalyearprojects Toall
 
A novel statistical cost model and an algorithm for efficient application off...
A novel statistical cost model and an algorithm for efficient application off...A novel statistical cost model and an algorithm for efficient application off...
A novel statistical cost model and an algorithm for efficient application off...Finalyearprojects Toall
 
A data and task co scheduling algorithm for scientific cloud workflows
A data and task co scheduling algorithm for scientific cloud workflowsA data and task co scheduling algorithm for scientific cloud workflows
A data and task co scheduling algorithm for scientific cloud workflowsFinalyearprojects Toall
 
A context aware service evaluation approach over big data for cloud applications
A context aware service evaluation approach over big data for cloud applicationsA context aware service evaluation approach over big data for cloud applications
A context aware service evaluation approach over big data for cloud applicationsFinalyearprojects Toall
 

Más de Finalyearprojects Toall (17)

Ieee 2018 2019 project titiles
Ieee 2018 2019 project titilesIeee 2018 2019 project titiles
Ieee 2018 2019 project titiles
 
Video stream analysis in clouds an object detection and classification frame...
Video stream analysis in clouds  an object detection and classification frame...Video stream analysis in clouds  an object detection and classification frame...
Video stream analysis in clouds an object detection and classification frame...
 
Unlicensed spectra fusion and interference coordination for lte systems
Unlicensed spectra fusion and interference coordination for lte systemsUnlicensed spectra fusion and interference coordination for lte systems
Unlicensed spectra fusion and interference coordination for lte systems
 
Text mining the contributors to rail accidents
Text mining the contributors to rail accidentsText mining the contributors to rail accidents
Text mining the contributors to rail accidents
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure clouds
 
On the performance impact of data access middleware for no sql data stores
On the performance impact of data access middleware for no sql data storesOn the performance impact of data access middleware for no sql data stores
On the performance impact of data access middleware for no sql data stores
 
Minimizing radio resource usage for machine to-machine communications through...
Minimizing radio resource usage for machine to-machine communications through...Minimizing radio resource usage for machine to-machine communications through...
Minimizing radio resource usage for machine to-machine communications through...
 
Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...
 
Identity based private matching over outsourced encrypted datasets
Identity based private matching over outsourced encrypted datasetsIdentity based private matching over outsourced encrypted datasets
Identity based private matching over outsourced encrypted datasets
 
Follow me cloud-when cloud services follow mobile users
Follow me cloud-when cloud services follow mobile usersFollow me cloud-when cloud services follow mobile users
Follow me cloud-when cloud services follow mobile users
 
Follow me cloud-when cloud services follow mobile users
Follow me cloud-when cloud services follow mobile usersFollow me cloud-when cloud services follow mobile users
Follow me cloud-when cloud services follow mobile users
 
Distributed and fair beaconing rate adaptation for congestion control in vehi...
Distributed and fair beaconing rate adaptation for congestion control in vehi...Distributed and fair beaconing rate adaptation for congestion control in vehi...
Distributed and fair beaconing rate adaptation for congestion control in vehi...
 
Assurance of security and privacy requirements for cloud deployment model
Assurance of security and privacy requirements for cloud deployment modelAssurance of security and privacy requirements for cloud deployment model
Assurance of security and privacy requirements for cloud deployment model
 
An optimization framework for mobile data collection in energy harvesting wir...
An optimization framework for mobile data collection in energy harvesting wir...An optimization framework for mobile data collection in energy harvesting wir...
An optimization framework for mobile data collection in energy harvesting wir...
 
A novel statistical cost model and an algorithm for efficient application off...
A novel statistical cost model and an algorithm for efficient application off...A novel statistical cost model and an algorithm for efficient application off...
A novel statistical cost model and an algorithm for efficient application off...
 
A data and task co scheduling algorithm for scientific cloud workflows
A data and task co scheduling algorithm for scientific cloud workflowsA data and task co scheduling algorithm for scientific cloud workflows
A data and task co scheduling algorithm for scientific cloud workflows
 
A context aware service evaluation approach over big data for cloud applications
A context aware service evaluation approach over big data for cloud applicationsA context aware service evaluation approach over big data for cloud applications
A context aware service evaluation approach over big data for cloud applications
 

Último

Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 

Último (20)

Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 

Stochastic load balancing for virtual resource management in datacenters

  • 1. IEEE PROJECTS DEVELOPMENTS WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB PROJECTS AND IPT TRAINING . CELL: +91 8870791415 Mail to: finalyearprojects2all@gmail.com Service Usage Classification with Encrypted Internet Traffic in Mobile Messaging Apps Abstract The rapid adoption of mobile messaging Apps has enabled us to collect massive amount of encrypted Internet traffic of mobile messaging. The classification of this traffic into different types of in-App service usages can help for intelligent network management, such as managing network bandwidth budget and providing quality of services. Traditional approaches for classification of Internet traffic rely on packet inspection, such as parsing HTTP headers. However, messaging Apps are increasingly using secure protocols, such as HTTPS and SSL, to transmit data. This imposes significant challenges on the performances of service usage classification by packet inspection. To this end, in this paper, we investigate how to exploit encrypted Internet traffic for classifying in-App usages. Specifically, we develop a system, named CUMMA, for classifying service usages of mobile messaging Apps by jointly modeling user behavioral patterns, network traffic characteristics and temporal dependencies. Along this line, we first segment Internet traffic from traffic-flows into sessions with a number of dialogs in a hierarchical way. Also, we extract the discriminative features of traffic data from two perspectives: (i) packet length and (ii) time delay. Next, we learn a service usage predictor to classify these segmented dialogs into single-type usages or outliers. In addition, we design a clustering Hidden Markov Model (HMM) based method to detect mixed dialogs from outliers and decompose mixed dialogs into sub-dialogs of single-type usage. Indeed, CUMMA enables mobile analysts to identify service usages and analyze end-user in-App behaviors even for encrypted Internet traffic. Finally, the extensive experiments on real-world messaging data demonstrate the effectiveness and efficiency of the proposed method for service usage classification. System Specification System Requirements:
  • 2. IEEE PROJECTS DEVELOPMENTS WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB PROJECTS AND IPT TRAINING . CELL: +91 8870791415 Mail to: finalyearprojects2all@gmail.com Hardware Requirements: • System : Pentium IV 2.4 GHz. • Hard Disk : 40 GB. • Floppy Drive : 1.44 Mb. • Monitor : 15 VGA Colour. • Mouse : Logitech. • Ram : 512 Mb. Software Requirements: • Operating system : - Windows 7. 32 bit • Coding Language : C#.net 4.0 • Data Base : SQL Server 2008