Quality of service management in telecommunication network using machine learning technique
Abstract
Keywords
Full Text:
PDFReferences
E. C. Molero, S. Vissicchio, and L. Vanbever, “FAst in-network GraY failure detection for ISPs,” in SIGCOMM 2022 - Proceedings of the ACM SIGCOMM 2022 Conference, Aug. 2022, pp. 677–692, doi: 10.1145/3544216.3544242.
T. Bhumrawi, C. Netramai, K. Kaemarungsi, and K. Limtanyakul, “Impact of multi-services over service provider’s local network measured by passive and active measurements techniques,” in Advances in Intelligent Systems and Computing, vol. 209 AISC, Springer Berlin Heidelberg, 2013, pp. 41–50.
F. Liu, T. Xie, Y. Feng, and D. Feng, “On the security of PPPoE network,” Security and Communication Networks, vol. 5, no. 10, pp. 1159–1168, Feb. 2012, doi: 10.1002/sec.512.
T. A. Assegie and H. D. Bizuneh, “Improving network performance with an integrated priority queue and weighted fair queue scheduling,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 19, no. 1, pp. 241–247, Jul. 2020, doi: 10.11591/ijeecs.v19.i1.pp241-247.
B. Ramasamy and G. F. Sudha, “Instantaneous channel characteristics and progression factor based collaborative routing,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 28, no. 2, pp. 918–925, Nov. 2022, doi: 10.11591/ijeecs.v28.i2.pp918-925.
N. Alqudah and Q. Yaseen, “Machine learning for traffic analysis: A review,” Procedia Computer Science, vol. 170, pp. 911–916, 2020, doi: 10.1016/j.procs.2020.03.111.
A. S. Jaradat, M. M. Barhoush, and R. B. Easa, “Network intrusion detection system: Machine learning approach,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 25, no. 2, pp. 1151–1158, Feb. 2022, doi: 10.11591/ijeecs.v25.i2.pp1151-1158.
A. Nacef, A. Kaci, Y. Aklouf, and D. L. C. Dutra, “Machine learning based fast self optimized and life cycle management network,” Computer Networks, vol. 209, p. 108895, May 2022, doi: 10.1016/j.comnet.2022.108895.
S. K. Pandey, R. B. Mishra, and A. K. Tripathi, “Machine learning based methods for software fault prediction: A survey,” Expert Systems with Applications, vol. 172, p. 114595, Jun. 2021, doi: 10.1016/j.eswa.2021.114595.
S. Suthaharan, “Big data classification: Problems and challenges in network intrusion prediction with machine learning,” Performance Evaluation Review, vol. 41, no. 4, pp. 70–73, Apr. 2014, doi: 10.1145/2627534.2627557.
Z. A. Khan and A. Samad, “A study of machine learning in wireless sensor network,” International Journal of Computer Networks And Applications, vol. 4, no. 4, Aug. 2017, doi: 10.22247/ijcna/2017/49122.
M. Shafiq, X. Yu, A. A. Laghari, L. Yao, N. K. Karn, and F. Abdessamia, “Network traffic classification techniques and comparative analysis using machine learning algorithms,” in 2016 2nd IEEE International Conference on Computer and Communications, ICCC 2016 - Proceedings, Oct. 2017, pp. 2451–2455, doi: 10.1109/CompComm.2016.7925139.
M. G. S. Murshed, C. Murphy, D. Hou, N. Khan, G. Ananthanarayanan, and F. Hussain, “Machine learning at the network edge: A survey,” ACM Computing Surveys, vol. 54, no. 8, pp. 1–37, Oct. 2022, doi: 10.1145/3469029.
V. Labayen, E. Magaña, D. Morató, and M. Izal, “Online classification of user activities using machine learning on network traffic,” Computer Networks, vol. 181, p. 107557, Nov. 2020, doi: 10.1016/j.comnet.2020.107557.
O. Nassef, W. Sun, H. Purmehdi, M. Tatipamula, and T. Mahmoodi, “A survey: Distributed machine learning for 5G and beyond,” Computer Networks, vol. 207, p. 108820, Apr. 2022, doi: 10.1016/j.comnet.2022.108820.
R. A. Rahman, S. Masrom, N. H. A. Samad, R. M. Daud, and E. Mutia, “Machine learning prediction of video-based learning with technology acceptance model,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 29, no. 3, pp. 1560–1566, Mar. 2023, doi: 10.11591/ijeecs.v29.i3.pp1560-1566.
Y. Zhao, B. Yan, D. Liu, Y. He, D. Wang, and J. Zhang, “SOON: self-optimizing optical networks with machine learning,” Optics Express, vol. 26, no. 22, p. 28713, Oct. 2018, doi: 10.1364/oe.26.028713.
W. S. Saif, M. A. Esmail, A. M. Ragheb, T. A. Alshawi, and S. A. Alshebeili, “Machine learning techniques for optical performance monitoring and modulation format identification: A survey,” IEEE Communications Surveys and Tutorials, vol. 22, no. 4, pp. 2839–2882, 2020, doi: 10.1109/COMST.2020.3018494.
M. H. H. Khairi et al., “Detection and classification of conflict flows in SDN using machine learning algorithms,” IEEE Access, vol. 9, pp. 76024–76037, 2021, doi: 10.1109/ACCESS.2021.3081629.
M. Reza, M. Javad, S. Raouf, and R. Javidan, “Network traffic classification using machine learning techniques over software defined networks,” International Journal of Advanced Computer Science and Applications, vol. 8, no. 7, 2017, doi: 10.14569/ijacsa.2017.080729.
Z. Xiong and N. Zilberman, “Do switches dream of machine learning?: Toward in-network classification,” in HotNets 2019 - Proceedings of the 18th ACM Workshop on Hot Topics in Networks, Nov. 2019, pp. 25–33, doi: 10.1145/3365609.3365864.
S. V. Mahadevkar et al., “A review on machine learning styles in computer vision - techniques and future directions,” IEEE Access, vol. 10, pp. 107293–107329, 2022, doi: 10.1109/ACCESS.2022.3209825.
A. B. Dehkordi, M. R. Soltanaghaei, and F. Z. Boroujeni, “The DDoS attacks detection through machine learning and statistical methods in SDN,” Journal of Supercomputing, vol. 77, no. 3, pp. 2383–2415, Jun. 2021, doi: 10.1007/s11227-020-03323-w.
K. M. Sudar, M. Beulah, P. Deepalakshmi, P. Nagaraj, and P. Chinnasamy, “Detection of distributed denial of service attacks in SDN using machine learning techniques,” Jan. 2021, doi: 10.1109/ICCCI50826.2021.9402517.
I. F. Kilincer, F. Ertam, and A. Sengur, “Machine learning methods for cyber security intrusion detection: Datasets and comparative study,” Computer Networks, vol. 188, p. 107840, Apr. 2021, doi: 10.1016/j.comnet.2021.107840.
M. Bagaa, D. L. C. Dutra, T. Taleb, and K. Samdanis, “On SDN-driven network optimization and QoS aware routing using multiple paths,” IEEE Transactions on Wireless Communications, vol. 19, no. 7, pp. 4700–4714, Jul. 2020, doi: 10.1109/TWC.2020.2986408.
A. I. Khan and S. Al-Habsi, “Machine learning in computer vision,” Procedia Computer Science, vol. 167, pp. 1444–1451, 2020, doi: 10.1016/j.procs.2020.03.355.
T. Z. Teshabaev, M. Z. Yakubova, and O. A. Manankova, “Analysis, research and simulation of a multiservice network based on the packet tracer software package to determine the value of delays to increasing value size of ICMP packet,” Nov. 2020, doi: 10.1109/ICISCT50599.2020.9351479.
M. Z. Yakubova, O. A. Manankova, K. A. Tashev, and G. S. Sadikova, “Methodology of the determining for pearson’s criterion based on researching the value of delays in the transmitting of information over a multiservice network,” Nov. 2020, doi: 10.1109/ICISCT50599.2020.9351419.
O. A. Manankova, M. Z. Yakubova, and A. S. Baikenov, “Cryptanalysis the SHA-256 hash function using rainbow tables,” Indonesian Journal of Electrical Engineering and Informatics, vol. 10, no. 4, pp. 930–944, Dec. 2022, doi: 10.52549/ijeei.v10i4.4247.
K. Fotiadou, T. H. Velivassaki, A. Voulkidis, D. Skias, S. Tsekeridou, and T. Zahariadis, “Network traffic anomaly detection via deep learning,” Information (Switzerland), vol. 12, no. 5, p. 215, May 2021, doi: 10.3390/info12050215.
L. K. Lok, V. A. Hameed, and M. E. Rana, “Hybrid machine learning approach for anomaly detection,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 27, no. 2, pp. 1016–1024, Aug. 2022, doi: 10.11591/ijeecs.v27.i2.pp1016-1024.
P. P. Ioulianou and V. G. Vassilakis, “Denial-of-service attacks and countermeasures in the RPL-based internet of things,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 11980 LNCS, Springer International Publishing, 2020, pp. 374–390.
A. Zhunussov, A. S. Baikenov, and D. Ilieva, “Monitoring the quality of services provided in a telecommunication network by analyzing the statistics of PPPoE packets,” Nov. 2020, doi: 10.1109/EEAE49144.2020.9279089.
A. Zhunussov, A. Baikenov, T. Zheltayev, T. Serikov, and T. Ziyekenov, “Maсhine learning technique in QoS management network,” Journal of Theoretical and Applied Information Technology, vol. 101, no. 2, pp. 904–911, 2023.
L. Mamakos, D. Simone, R. Wheeler, D. Carrel, J. Evarts, and K. Lidl, “A method for transmitting PPP over Ethernet (PPPoE), RFC 2516 (Informational),” {RFC} Editor, Feb. 1999, doi: 10.17487/rfc2516.
S. Bradner, “Benchmarking terminology for network interconnection devices,” {RFC} Editor, Jul. 1991. [Online]. Available: https://www.ietf.org/rfc/rfc1242.txt.
A. Morton, “Round-trip packet loss metrics,” {RFC} Editor, Aug. 2012. doi: 10.17487/rfc6673.
DOI: http://doi.org/10.11591/ijeecs.v32.i2.pp1022-1030
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Indonesian Journal of Electrical Engineering and Computer Science (IJEECS)
p-ISSN: 2502-4752, e-ISSN: 2502-4760
This journal is published by the Institute of Advanced Engineering and Science (IAES) in collaboration with Intelektual Pustaka Media Utama (IPMU).