SlideShare a Scribd company logo
IEEE PROJECTS DEVELOPMENTS
WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING
PROJECTS AND TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET
PROJECTS, NS2 PROJECTS, MATLAB PROJECTS AND IPT TRAINING .
CELL: +91 8870791415
Mail to: finalyearprojects2all@gmail.com
Service Usage Classification with Encrypted Internet Traffic in Mobile Messaging Apps
Abstract
The rapid adoption of mobile messaging Apps has enabled us to collect massive amount
of encrypted Internet traffic of mobile messaging. The classification of this traffic into different
types of in-App service usages can help for intelligent network management, such as managing
network bandwidth budget and providing quality of services. Traditional approaches for
classification of Internet traffic rely on packet inspection, such as parsing HTTP headers.
However, messaging Apps are increasingly using secure protocols, such as HTTPS and SSL, to
transmit data. This imposes significant challenges on the performances of service usage
classification by packet inspection. To this end, in this paper, we investigate how to exploit
encrypted Internet traffic for classifying in-App usages. Specifically, we develop a system,
named CUMMA, for classifying service usages of mobile messaging Apps by jointly modeling
user behavioral patterns, network traffic characteristics and temporal dependencies. Along this
line, we first segment Internet traffic from traffic-flows into sessions with a number of dialogs in
a hierarchical way. Also, we extract the discriminative features of traffic data from two
perspectives: (i) packet length and (ii) time delay. Next, we learn a service usage predictor to
classify these segmented dialogs into single-type usages or outliers. In addition, we design a
clustering Hidden Markov Model (HMM) based method to detect mixed dialogs from outliers
and decompose mixed dialogs into sub-dialogs of single-type usage. Indeed, CUMMA enables
mobile analysts to identify service usages and analyze end-user in-App behaviors even for
encrypted Internet traffic. Finally, the extensive experiments on real-world messaging data
demonstrate the effectiveness and efficiency of the proposed method for service usage
classification.
System Specification
System Requirements:
IEEE PROJECTS DEVELOPMENTS
WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING
PROJECTS AND TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET
PROJECTS, NS2 PROJECTS, MATLAB PROJECTS AND IPT TRAINING .
CELL: +91 8870791415
Mail to: finalyearprojects2all@gmail.com
Hardware Requirements:
• System : Pentium IV 2.4 GHz.
• Hard Disk : 40 GB.
• Floppy Drive : 1.44 Mb.
• Monitor : 15 VGA Colour.
• Mouse : Logitech.
• Ram : 512 Mb.
Software Requirements:
• Operating system : - Windows 7. 32 bit
• Coding Language : C#.net 4.0
• Data Base : SQL Server 2008

More Related Content

What's hot

CCNA Discovery Networking for Home and Small Businesses - Chapter 6
CCNA Discovery Networking for Home and Small Businesses - Chapter 6CCNA Discovery Networking for Home and Small Businesses - Chapter 6
CCNA Discovery Networking for Home and Small Businesses - Chapter 6Tutorials Tips Tricks
 
efficient data query in intermittently-connected mobile ad hoc social networks
efficient data query in intermittently-connected mobile ad hoc social networksefficient data query in intermittently-connected mobile ad hoc social networks
efficient data query in intermittently-connected mobile ad hoc social networks
swathi78
 
Improving the search mechanism for unstructured peer to-peer networks using t...
Improving the search mechanism for unstructured peer to-peer networks using t...Improving the search mechanism for unstructured peer to-peer networks using t...
Improving the search mechanism for unstructured peer to-peer networks using t...
Aditya Kumar
 
Internet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detectionInternet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detection
Gyan Prakash
 
A COMPARATIVE STUDY OF PROCESS MEDIATOR COMPONENTS THAT SUPPORT BEHAVIORAL IN...
A COMPARATIVE STUDY OF PROCESS MEDIATOR COMPONENTS THAT SUPPORT BEHAVIORAL IN...A COMPARATIVE STUDY OF PROCESS MEDIATOR COMPONENTS THAT SUPPORT BEHAVIORAL IN...
A COMPARATIVE STUDY OF PROCESS MEDIATOR COMPONENTS THAT SUPPORT BEHAVIORAL IN...
ijwscjournal
 
Botnet communication patterns 2
Botnet communication patterns 2Botnet communication patterns 2
Botnet communication patterns 2
killswitch4
 
Hybrid distributed application in banking transaction using remote method inv...
Hybrid distributed application in banking transaction using remote method inv...Hybrid distributed application in banking transaction using remote method inv...
Hybrid distributed application in banking transaction using remote method inv...
TELKOMNIKA JOURNAL
 
3iemail
3iemail3iemail
3iemail
ARUN REDDY M
 

What's hot (10)

CCNA Discovery Networking for Home and Small Businesses - Chapter 6
CCNA Discovery Networking for Home and Small Businesses - Chapter 6CCNA Discovery Networking for Home and Small Businesses - Chapter 6
CCNA Discovery Networking for Home and Small Businesses - Chapter 6
 
presentation_SB_v01
presentation_SB_v01presentation_SB_v01
presentation_SB_v01
 
Hou_Resume
Hou_ResumeHou_Resume
Hou_Resume
 
efficient data query in intermittently-connected mobile ad hoc social networks
efficient data query in intermittently-connected mobile ad hoc social networksefficient data query in intermittently-connected mobile ad hoc social networks
efficient data query in intermittently-connected mobile ad hoc social networks
 
Improving the search mechanism for unstructured peer to-peer networks using t...
Improving the search mechanism for unstructured peer to-peer networks using t...Improving the search mechanism for unstructured peer to-peer networks using t...
Improving the search mechanism for unstructured peer to-peer networks using t...
 
Internet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detectionInternet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detection
 
A COMPARATIVE STUDY OF PROCESS MEDIATOR COMPONENTS THAT SUPPORT BEHAVIORAL IN...
A COMPARATIVE STUDY OF PROCESS MEDIATOR COMPONENTS THAT SUPPORT BEHAVIORAL IN...A COMPARATIVE STUDY OF PROCESS MEDIATOR COMPONENTS THAT SUPPORT BEHAVIORAL IN...
A COMPARATIVE STUDY OF PROCESS MEDIATOR COMPONENTS THAT SUPPORT BEHAVIORAL IN...
 
Botnet communication patterns 2
Botnet communication patterns 2Botnet communication patterns 2
Botnet communication patterns 2
 
Hybrid distributed application in banking transaction using remote method inv...
Hybrid distributed application in banking transaction using remote method inv...Hybrid distributed application in banking transaction using remote method inv...
Hybrid distributed application in banking transaction using remote method inv...
 
3iemail
3iemail3iemail
3iemail
 

Similar to Stochastic load balancing for virtual resource management in datacenters

Final year IEEE 2016-2017 PROJECTS TITLES (IEEE 2016 papers) For ME,M.Tech,BE...
Final year IEEE 2016-2017 PROJECTS TITLES (IEEE 2016 papers) For ME,M.Tech,BE...Final year IEEE 2016-2017 PROJECTS TITLES (IEEE 2016 papers) For ME,M.Tech,BE...
Final year IEEE 2016-2017 PROJECTS TITLES (IEEE 2016 papers) For ME,M.Tech,BE...
S3 Infotech IEEE Projects
 
About M2M Standards
About M2M StandardsAbout M2M Standards
About M2M Standards
Coldbeans Software
 
About M2M standards and their possible extensions
About M2M standards and their possible extensionsAbout M2M standards and their possible extensions
About M2M standards and their possible extensions
Coldbeans Software
 
MIQModel: Predictive Model for Mobile Internet
MIQModel: Predictive Model for Mobile InternetMIQModel: Predictive Model for Mobile Internet
MIQModel: Predictive Model for Mobile Internet
Katarzyna Wac & The QoL Lab
 
Automated Traffic Classification And Application Identification Using Machine...
Automated Traffic Classification And Application Identification Using Machine...Automated Traffic Classification And Application Identification Using Machine...
Automated Traffic Classification And Application Identification Using Machine...
Jennifer Daniel
 
Final Year IEEE Project Titles 2015
Final Year IEEE Project Titles 2015Final Year IEEE Project Titles 2015
Final Year IEEE Project Titles 2015
TTA_TNagar
 
Final Year Project IEEE 2015
Final Year Project IEEE 2015Final Year Project IEEE 2015
Final Year Project IEEE 2015
TTA_TNagar
 
Statistical Dissemination Control in Large Machine-to-Machine Communication N...
Statistical Dissemination Control in Large Machine-to-Machine Communication N...Statistical Dissemination Control in Large Machine-to-Machine Communication N...
Statistical Dissemination Control in Large Machine-to-Machine Communication N...
kitechsolutions
 
Optimization and Evaluation of a Multimedia Streaming Service on Hybrid Telco...
Optimization and Evaluation of a Multimedia Streaming Service on Hybrid Telco...Optimization and Evaluation of a Multimedia Streaming Service on Hybrid Telco...
Optimization and Evaluation of a Multimedia Streaming Service on Hybrid Telco...
ijccsa
 
Learning-based Orchestrator for Intelligent Software-defined Networking Contr...
Learning-based Orchestrator for Intelligent Software-defined Networking Contr...Learning-based Orchestrator for Intelligent Software-defined Networking Contr...
Learning-based Orchestrator for Intelligent Software-defined Networking Contr...
ijseajournal
 
LEARNING-BASED ORCHESTRATOR FOR INTELLIGENT SOFTWARE-DEFINED NETWORKING CONTR...
LEARNING-BASED ORCHESTRATOR FOR INTELLIGENT SOFTWARE-DEFINED NETWORKING CONTR...LEARNING-BASED ORCHESTRATOR FOR INTELLIGENT SOFTWARE-DEFINED NETWORKING CONTR...
LEARNING-BASED ORCHESTRATOR FOR INTELLIGENT SOFTWARE-DEFINED NETWORKING CONTR...
ijseajournal
 
Machine Learning 5G Federated Learning.pdf
Machine Learning 5G Federated Learning.pdfMachine Learning 5G Federated Learning.pdf
Machine Learning 5G Federated Learning.pdf
adeyimikaipaye
 
Ncct Ieee Software Abstract Collection Volume 1 50+ Abst
Ncct   Ieee Software Abstract Collection Volume 1   50+ AbstNcct   Ieee Software Abstract Collection Volume 1   50+ Abst
Ncct Ieee Software Abstract Collection Volume 1 50+ Abst
ncct
 
JAVA 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for mob...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for mob...JAVA 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for mob...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for mob...
IEEEGLOBALSOFTTECHNOLOGIES
 
A scalable server architecture for mobile presence services in social network...
A scalable server architecture for mobile presence services in social network...A scalable server architecture for mobile presence services in social network...
A scalable server architecture for mobile presence services in social network...
IEEEFINALYEARPROJECTS
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
IEEEGLOBALSOFTTECHNOLOGIES
 
3 S W 2009 I E E E Abstracts Java, N C C T Chennai
3    S W   2009  I E E E  Abstracts    Java,  N C C T  Chennai3    S W   2009  I E E E  Abstracts    Java,  N C C T  Chennai
3 S W 2009 I E E E Abstracts Java, N C C T Chennai
ncct
 
Review paper on web service security
Review paper on web service securityReview paper on web service security
Review paper on web service security
Editor Jacotech
 
B E M E Projects M C A Projects B
B E  M E  Projects  M C A  Projects  BB E  M E  Projects  M C A  Projects  B
B E M E Projects M C A Projects B
ncct
 
Be Projects M.E Projects M.Tech Projects Mca Projects B.Tech Projects Polytec...
Be Projects M.E Projects M.Tech Projects Mca Projects B.Tech Projects Polytec...Be Projects M.E Projects M.Tech Projects Mca Projects B.Tech Projects Polytec...
Be Projects M.E Projects M.Tech Projects Mca Projects B.Tech Projects Polytec...
ncct
 

Similar to Stochastic load balancing for virtual resource management in datacenters (20)

Final year IEEE 2016-2017 PROJECTS TITLES (IEEE 2016 papers) For ME,M.Tech,BE...
Final year IEEE 2016-2017 PROJECTS TITLES (IEEE 2016 papers) For ME,M.Tech,BE...Final year IEEE 2016-2017 PROJECTS TITLES (IEEE 2016 papers) For ME,M.Tech,BE...
Final year IEEE 2016-2017 PROJECTS TITLES (IEEE 2016 papers) For ME,M.Tech,BE...
 
About M2M Standards
About M2M StandardsAbout M2M Standards
About M2M Standards
 
About M2M standards and their possible extensions
About M2M standards and their possible extensionsAbout M2M standards and their possible extensions
About M2M standards and their possible extensions
 
MIQModel: Predictive Model for Mobile Internet
MIQModel: Predictive Model for Mobile InternetMIQModel: Predictive Model for Mobile Internet
MIQModel: Predictive Model for Mobile Internet
 
Automated Traffic Classification And Application Identification Using Machine...
Automated Traffic Classification And Application Identification Using Machine...Automated Traffic Classification And Application Identification Using Machine...
Automated Traffic Classification And Application Identification Using Machine...
 
Final Year IEEE Project Titles 2015
Final Year IEEE Project Titles 2015Final Year IEEE Project Titles 2015
Final Year IEEE Project Titles 2015
 
Final Year Project IEEE 2015
Final Year Project IEEE 2015Final Year Project IEEE 2015
Final Year Project IEEE 2015
 
Statistical Dissemination Control in Large Machine-to-Machine Communication N...
Statistical Dissemination Control in Large Machine-to-Machine Communication N...Statistical Dissemination Control in Large Machine-to-Machine Communication N...
Statistical Dissemination Control in Large Machine-to-Machine Communication N...
 
Optimization and Evaluation of a Multimedia Streaming Service on Hybrid Telco...
Optimization and Evaluation of a Multimedia Streaming Service on Hybrid Telco...Optimization and Evaluation of a Multimedia Streaming Service on Hybrid Telco...
Optimization and Evaluation of a Multimedia Streaming Service on Hybrid Telco...
 
Learning-based Orchestrator for Intelligent Software-defined Networking Contr...
Learning-based Orchestrator for Intelligent Software-defined Networking Contr...Learning-based Orchestrator for Intelligent Software-defined Networking Contr...
Learning-based Orchestrator for Intelligent Software-defined Networking Contr...
 
LEARNING-BASED ORCHESTRATOR FOR INTELLIGENT SOFTWARE-DEFINED NETWORKING CONTR...
LEARNING-BASED ORCHESTRATOR FOR INTELLIGENT SOFTWARE-DEFINED NETWORKING CONTR...LEARNING-BASED ORCHESTRATOR FOR INTELLIGENT SOFTWARE-DEFINED NETWORKING CONTR...
LEARNING-BASED ORCHESTRATOR FOR INTELLIGENT SOFTWARE-DEFINED NETWORKING CONTR...
 
Machine Learning 5G Federated Learning.pdf
Machine Learning 5G Federated Learning.pdfMachine Learning 5G Federated Learning.pdf
Machine Learning 5G Federated Learning.pdf
 
Ncct Ieee Software Abstract Collection Volume 1 50+ Abst
Ncct   Ieee Software Abstract Collection Volume 1   50+ AbstNcct   Ieee Software Abstract Collection Volume 1   50+ Abst
Ncct Ieee Software Abstract Collection Volume 1 50+ Abst
 
JAVA 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for mob...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for mob...JAVA 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for mob...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for mob...
 
A scalable server architecture for mobile presence services in social network...
A scalable server architecture for mobile presence services in social network...A scalable server architecture for mobile presence services in social network...
A scalable server architecture for mobile presence services in social network...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
 
3 S W 2009 I E E E Abstracts Java, N C C T Chennai
3    S W   2009  I E E E  Abstracts    Java,  N C C T  Chennai3    S W   2009  I E E E  Abstracts    Java,  N C C T  Chennai
3 S W 2009 I E E E Abstracts Java, N C C T Chennai
 
Review paper on web service security
Review paper on web service securityReview paper on web service security
Review paper on web service security
 
B E M E Projects M C A Projects B
B E  M E  Projects  M C A  Projects  BB E  M E  Projects  M C A  Projects  B
B E M E Projects M C A Projects B
 
Be Projects M.E Projects M.Tech Projects Mca Projects B.Tech Projects Polytec...
Be Projects M.E Projects M.Tech Projects Mca Projects B.Tech Projects Polytec...Be Projects M.E Projects M.Tech Projects Mca Projects B.Tech Projects Polytec...
Be Projects M.E Projects M.Tech Projects Mca Projects B.Tech Projects Polytec...
 

More from Finalyearprojects Toall

Ieee 2018 2019 project titiles
Ieee 2018 2019 project titilesIeee 2018 2019 project titiles
Ieee 2018 2019 project titiles
Finalyearprojects Toall
 
Video stream analysis in clouds an object detection and classification frame...
Video stream analysis in clouds  an object detection and classification frame...Video stream analysis in clouds  an object detection and classification frame...
Video stream analysis in clouds an object detection and classification frame...
Finalyearprojects Toall
 
Unlicensed spectra fusion and interference coordination for lte systems
Unlicensed spectra fusion and interference coordination for lte systemsUnlicensed spectra fusion and interference coordination for lte systems
Unlicensed spectra fusion and interference coordination for lte systems
Finalyearprojects Toall
 
Text mining the contributors to rail accidents
Text mining the contributors to rail accidentsText mining the contributors to rail accidents
Text mining the contributors to rail accidents
Finalyearprojects Toall
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure clouds
Finalyearprojects Toall
 
On the performance impact of data access middleware for no sql data stores
On the performance impact of data access middleware for no sql data storesOn the performance impact of data access middleware for no sql data stores
On the performance impact of data access middleware for no sql data stores
Finalyearprojects Toall
 
Minimizing radio resource usage for machine to-machine communications through...
Minimizing radio resource usage for machine to-machine communications through...Minimizing radio resource usage for machine to-machine communications through...
Minimizing radio resource usage for machine to-machine communications through...
Finalyearprojects Toall
 
Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...
Finalyearprojects Toall
 
Identity based private matching over outsourced encrypted datasets
Identity based private matching over outsourced encrypted datasetsIdentity based private matching over outsourced encrypted datasets
Identity based private matching over outsourced encrypted datasets
Finalyearprojects Toall
 
Follow me cloud-when cloud services follow mobile users
Follow me cloud-when cloud services follow mobile usersFollow me cloud-when cloud services follow mobile users
Follow me cloud-when cloud services follow mobile users
Finalyearprojects Toall
 
Follow me cloud-when cloud services follow mobile users
Follow me cloud-when cloud services follow mobile usersFollow me cloud-when cloud services follow mobile users
Follow me cloud-when cloud services follow mobile users
Finalyearprojects Toall
 
Distributed and fair beaconing rate adaptation for congestion control in vehi...
Distributed and fair beaconing rate adaptation for congestion control in vehi...Distributed and fair beaconing rate adaptation for congestion control in vehi...
Distributed and fair beaconing rate adaptation for congestion control in vehi...
Finalyearprojects Toall
 
Assurance of security and privacy requirements for cloud deployment model
Assurance of security and privacy requirements for cloud deployment modelAssurance of security and privacy requirements for cloud deployment model
Assurance of security and privacy requirements for cloud deployment model
Finalyearprojects Toall
 
An optimization framework for mobile data collection in energy harvesting wir...
An optimization framework for mobile data collection in energy harvesting wir...An optimization framework for mobile data collection in energy harvesting wir...
An optimization framework for mobile data collection in energy harvesting wir...
Finalyearprojects Toall
 
A novel statistical cost model and an algorithm for efficient application off...
A novel statistical cost model and an algorithm for efficient application off...A novel statistical cost model and an algorithm for efficient application off...
A novel statistical cost model and an algorithm for efficient application off...
Finalyearprojects Toall
 
A data and task co scheduling algorithm for scientific cloud workflows
A data and task co scheduling algorithm for scientific cloud workflowsA data and task co scheduling algorithm for scientific cloud workflows
A data and task co scheduling algorithm for scientific cloud workflows
Finalyearprojects Toall
 
A context aware service evaluation approach over big data for cloud applications
A context aware service evaluation approach over big data for cloud applicationsA context aware service evaluation approach over big data for cloud applications
A context aware service evaluation approach over big data for cloud applications
Finalyearprojects Toall
 

More from Finalyearprojects Toall (17)

Ieee 2018 2019 project titiles
Ieee 2018 2019 project titilesIeee 2018 2019 project titiles
Ieee 2018 2019 project titiles
 
Video stream analysis in clouds an object detection and classification frame...
Video stream analysis in clouds  an object detection and classification frame...Video stream analysis in clouds  an object detection and classification frame...
Video stream analysis in clouds an object detection and classification frame...
 
Unlicensed spectra fusion and interference coordination for lte systems
Unlicensed spectra fusion and interference coordination for lte systemsUnlicensed spectra fusion and interference coordination for lte systems
Unlicensed spectra fusion and interference coordination for lte systems
 
Text mining the contributors to rail accidents
Text mining the contributors to rail accidentsText mining the contributors to rail accidents
Text mining the contributors to rail accidents
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure clouds
 
On the performance impact of data access middleware for no sql data stores
On the performance impact of data access middleware for no sql data storesOn the performance impact of data access middleware for no sql data stores
On the performance impact of data access middleware for no sql data stores
 
Minimizing radio resource usage for machine to-machine communications through...
Minimizing radio resource usage for machine to-machine communications through...Minimizing radio resource usage for machine to-machine communications through...
Minimizing radio resource usage for machine to-machine communications through...
 
Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...
 
Identity based private matching over outsourced encrypted datasets
Identity based private matching over outsourced encrypted datasetsIdentity based private matching over outsourced encrypted datasets
Identity based private matching over outsourced encrypted datasets
 
Follow me cloud-when cloud services follow mobile users
Follow me cloud-when cloud services follow mobile usersFollow me cloud-when cloud services follow mobile users
Follow me cloud-when cloud services follow mobile users
 
Follow me cloud-when cloud services follow mobile users
Follow me cloud-when cloud services follow mobile usersFollow me cloud-when cloud services follow mobile users
Follow me cloud-when cloud services follow mobile users
 
Distributed and fair beaconing rate adaptation for congestion control in vehi...
Distributed and fair beaconing rate adaptation for congestion control in vehi...Distributed and fair beaconing rate adaptation for congestion control in vehi...
Distributed and fair beaconing rate adaptation for congestion control in vehi...
 
Assurance of security and privacy requirements for cloud deployment model
Assurance of security and privacy requirements for cloud deployment modelAssurance of security and privacy requirements for cloud deployment model
Assurance of security and privacy requirements for cloud deployment model
 
An optimization framework for mobile data collection in energy harvesting wir...
An optimization framework for mobile data collection in energy harvesting wir...An optimization framework for mobile data collection in energy harvesting wir...
An optimization framework for mobile data collection in energy harvesting wir...
 
A novel statistical cost model and an algorithm for efficient application off...
A novel statistical cost model and an algorithm for efficient application off...A novel statistical cost model and an algorithm for efficient application off...
A novel statistical cost model and an algorithm for efficient application off...
 
A data and task co scheduling algorithm for scientific cloud workflows
A data and task co scheduling algorithm for scientific cloud workflowsA data and task co scheduling algorithm for scientific cloud workflows
A data and task co scheduling algorithm for scientific cloud workflows
 
A context aware service evaluation approach over big data for cloud applications
A context aware service evaluation approach over big data for cloud applicationsA context aware service evaluation approach over big data for cloud applications
A context aware service evaluation approach over big data for cloud applications
 

Recently uploaded

The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
Celine George
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
GeoBlogs
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
EduSkills OECD
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
Vivekanand Anglo Vedic Academy
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Col Mukteshwar Prasad
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
Excellence Foundation for South Sudan
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 

Recently uploaded (20)

The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 

Stochastic load balancing for virtual resource management in datacenters

  • 1. IEEE PROJECTS DEVELOPMENTS WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB PROJECTS AND IPT TRAINING . CELL: +91 8870791415 Mail to: finalyearprojects2all@gmail.com Service Usage Classification with Encrypted Internet Traffic in Mobile Messaging Apps Abstract The rapid adoption of mobile messaging Apps has enabled us to collect massive amount of encrypted Internet traffic of mobile messaging. The classification of this traffic into different types of in-App service usages can help for intelligent network management, such as managing network bandwidth budget and providing quality of services. Traditional approaches for classification of Internet traffic rely on packet inspection, such as parsing HTTP headers. However, messaging Apps are increasingly using secure protocols, such as HTTPS and SSL, to transmit data. This imposes significant challenges on the performances of service usage classification by packet inspection. To this end, in this paper, we investigate how to exploit encrypted Internet traffic for classifying in-App usages. Specifically, we develop a system, named CUMMA, for classifying service usages of mobile messaging Apps by jointly modeling user behavioral patterns, network traffic characteristics and temporal dependencies. Along this line, we first segment Internet traffic from traffic-flows into sessions with a number of dialogs in a hierarchical way. Also, we extract the discriminative features of traffic data from two perspectives: (i) packet length and (ii) time delay. Next, we learn a service usage predictor to classify these segmented dialogs into single-type usages or outliers. In addition, we design a clustering Hidden Markov Model (HMM) based method to detect mixed dialogs from outliers and decompose mixed dialogs into sub-dialogs of single-type usage. Indeed, CUMMA enables mobile analysts to identify service usages and analyze end-user in-App behaviors even for encrypted Internet traffic. Finally, the extensive experiments on real-world messaging data demonstrate the effectiveness and efficiency of the proposed method for service usage classification. System Specification System Requirements:
  • 2. IEEE PROJECTS DEVELOPMENTS WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB PROJECTS AND IPT TRAINING . CELL: +91 8870791415 Mail to: finalyearprojects2all@gmail.com Hardware Requirements: • System : Pentium IV 2.4 GHz. • Hard Disk : 40 GB. • Floppy Drive : 1.44 Mb. • Monitor : 15 VGA Colour. • Mouse : Logitech. • Ram : 512 Mb. Software Requirements: • Operating system : - Windows 7. 32 bit • Coding Language : C#.net 4.0 • Data Base : SQL Server 2008