Patent application number | Description | Published |
20110019574 | TECHNIQUE FOR CLASSIFYING NETWORK TRAFFIC AND FOR VALIDATING A MECHANISM FOR CLASSIFYING NETWORK TRAFFIC - A technique for classifying network traffic in the form of data packets generated by multiple applications installed on a device ( | 01-27-2011 |
20110080835 | TRAFFIC MONITORING BY LOWEST TRANSMISSION LAYER MARKING - A monitoring system is provided for monitoring transport of data through interconnected nodes for processing data packets in a communication system, wherein said data packets conform to a layered transmission protocol, the system comprising: (1) a marking node for marking a packet selected according to a marking rule by placing a monitoring indicator in the lowest protocol layer thereof, said data packet having a first number of protocol layers, (2) at least, one packet processing node for forming a data packet based or the marked packet, such that said formed data packet comprises a second number of protocol layers that is different from said first number of protocol layers and such that said indicator is in the lowest protocol layer of said formed data packet, and (3) a monitoring node for monitoring said transport of data on the basis of the indicators in data packets that have passed through the at least one packet processing node. | 04-07-2011 |
20110252046 | STRING MATCHING METHOD AND APPARATUS - Embodiments of the present invention include a method and apparatus for encoding the signature string X into a first part B and a second part R with reference to a dictionary comprising a plurality of codes. The first part B identifies which, if any, characters of the signature string X are wildcard characters. The second part R is formed by, for each character in the signature string X that is not a wildcard character, retrieving a code from the dictionary based on the character and its position within the signature string X, the dictionary holding a different code for each such character-position pairing, and combining the retrieved codes according to a predetermined logical operation (e.g. XOR) to form the second part R. | 10-13-2011 |
20120047200 | USER BEHAVIOR BASED MOBILE BROADBAND USER PLANE TRAFFIC GENERATION SYSTEM AND METHOD FOR REAL-LIKE MEASUREMENT GENERATION - A system, a method, and a graphical user interface testing tool are described herein for constructing a validation trace (i.e., high-speed realistic network traffic) using a real network without causing privacy concerns. In one embodiment, the method comprises the steps of: (a) providing a client device which has one or more applications operating thereon and a graphical user interface; (b) recording user interactions on the client device; (c) extracting usage scenarios from real network traffic in the real network; (d) emulating user actions on the client device according to a specific user scenario by utilizing the recorded user interactions and the extracted usage scenarios to generate additional real traffic in the real network; and (e) creating the validation trace based on the generated additional real traffic and the extracted usage scenarios. | 02-23-2012 |
20130100849 | CREATING AND USING MULTIPLE PACKET TRAFFIC PROFILING MODELS TO PROFILE PACKET FLOWS - Hybrid packet traffic flow profiling technology inspects packet headers to classify packet traffic flows using clustering models developed using unsupervised learning based on known packet traffic flows and one or more traffic classification models developed using supervised learning based on the known packet traffic flows. | 04-25-2013 |
20130107715 | METHOD AND ARRANGEMENT FOR DATA CLUSTERING | 05-02-2013 |
20130121161 | Apparatus and Method in a Telecommunications Network - An entity in a telecommunications network, for example a user equipment, determines a threshold value relating to a channel switching parameter that is being used by the telecommunications network to trigger a channel switching operation, and uses this threshold value and monitored traffic information to prevent a channel change from occurring, i.e. to maintain channel occupancy. A network node is adapted to remove additional traffic that has been generated by an entity in the telecommunications network to maintain channel occupancy. | 05-16-2013 |
20130148513 | CREATING PACKET TRAFFIC CLUSTERING MODELS FOR PROFILING PACKET FLOWS - Packet traffic profiling models are created based on packet headers of a packet flow at a first model aggregation level to obtain first flow information describing packet-oriented parameters of the flow. A machine learning algorithm (MLA) creates a first model based on the first information, determines if the first model achieves a first confidence level, and if not, defines multiple flow slices in the packet flow. Flow slices at a second higher model aggregation level are processed to obtain second flow information describing flow slice-oriented parameters of the packet flow, and an MLA creates a second model based on the second information to determine if the second model achieves a second confidence level. If so, the process completes; if not, further processing continues at a next level. One of the models is selected for profiling packet traffic flows. | 06-13-2013 |
20130194930 | Application Identification Through Data Traffic Analysis - There is provided a method of processing, analysing or profiling traffic in a packet switched telecommunications network. During a first phase (S | 08-01-2013 |