<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>A Model for Transformation of Self-Similar Traffic into Poisson's Arrival Packets</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Svetlana V. Govorova</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>mitnik</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>@yandex.ru</string-name>
          <email>territoreer@yandex.ru</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Gennadiy I. Linets</institution>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>North-Caucasus Federal University</institution>
          ,
          <addr-line>Stavropol, Russian Federation</addr-line>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Sergey V. Melnikov</institution>
        </aff>
      </contrib-group>
      <fpage>107</fpage>
      <lpage>114</lpage>
      <abstract>
        <p>Using functional transformation, we propose an approach allowing to convert a self-similar input packet stream of multiservice traffic and to obtain a stream with the properties of the elementary stream and the variation coefficient equal to one. In: S. Holldobler, A. Malikov, C. Wernhard (eds.): YSIP2 { Proceedings of the Second Young Scientist's International Workshop on Trends in Information Processing, Dombai, Russian Federation, May 16{20, 2017, published at http://ceur-ws.org.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1 Introduction</title>
      <p>When used in transportation networks, various control mechanisms inevitably experience nonlinear dependence due
to the objective limitations of the available resources leading to various conflict situations and manifestation of the
fractal properties of the network load, which cannot be resolved by simple methods. If the flow control mechanisms are
not used in transportation networks, the network traffic demonstrates fractal properties to a lesser extent. The problem
arises with the use of flow control and congestion avoidance mechanisms, when additional non-linearity appears. In such
situations, the relation between traffic fluctuations and network control mechanisms may become complex. The problem
of the correct allocation of network resources becomes particularly acute in such situations. The arising non -linearity
with possible dynamic behavior of systems in packet based networks results in the manifestation of random properties,
which entails the following problems.</p>
      <p>Required:
1. To check the network traffic for self-similarity.
2. To measure the numerical values of the Hurst exponent.
3. To know the change rate of traffic characteristics when subjected to network management tools in the course of
transport networks operation.
4. To assess the impact of traffic on the productivity and efficiency of network management tools.</p>
      <p>In reality, the traffic verification for self-similarity is an extremely difficult task. The problem is that the real world
always operates finite datasets. Therefore, checking whether a route is self-similar is usually an impossible practical task.
It is important to explore various self-similarity properties in real traffic. The difficulty is that even if certain
selfsimilarity properties are confirmed, it does not conclude that the analyzed data are self-similar in structure, as other
impacts may cause the same traffic characteristics (for example, the arising transiency). Some transient processes (such
as processes with bias levels) may result in similar properties. This means that the pulsing network traffic can be caused
by both long-term dependence and transiency of the observed process. Studies have shown that the present transiency
may result in wrong conclusions when analyzing the results of self-similarity tests. It is also essential to apply
background information on the change rates within the critical values of self-similarity parameters. This would allow: to
simulate such processes in a real network environment, generating processes with given characteristics; to study the
transport network response when its inputs are exposed to self-similar traffic; to compile practical steps for self-similar
traffic management; to obtain analytical dependencies prior to optimization of the topological structure of transport
networks.</p>
    </sec>
    <sec id="sec-2">
      <title>2 Current Problem Analysis</title>
      <p>The study of self-similar traffic management issues in the early stages of its development [She07]. The scale invariant
traffic structure brings new complexity to the overall picture of the transport network management, which complicates
the task of providing the required quality of service and efficient use of resources. The pulsating traffic structure with
self-similar properties implies the existence of congestion (high activity) periods in long time periods, which negatively
affects the overload management. However, the long-term dependence inherently implies the existence of an unusual
Copyright c 2017 by the paper's authors. Copying permitted for private and academic purposes.
traffic correlation structure, which can be used for handling the so-called overload control. Shelukhin et al.[She07]
demonstrate the possibility of forecasting random processes in terms of self-similar traffic transmission with high
reliability and at long time intervals. To achieve this, they propose a traffic regulation mechanism based on the
multiscale structure of overload control, which may be used to enhance the efficiency of the network functioning [She11].</p>
      <p>The pulsating traffic structure invariant to the scale impacts the quality indicators and performance of a network and
is incompatible with the traditional models of network traffic. Therefore, it is an extremely important practical task to
determine the causes and reduce the consequences of self-similarity influence. When developing efficient integrated
network structures, within which the guarantee of the requested QoS (Quality of Service) is maintained using the
resources to the maximum effect, the issues of understanding and justification of self-similarity based on the physical
principles of the real network environment take the primary focus.</p>
      <p>Having analyzed 717 reference sources (mainly US), the authors present the main factors that may produce various
types of long-term dependence of network traffic [She07]: user behavior; data generation, structure and retrieval; traffic
packing; network control means; closed-loop control mechanisms; network development. It is noteworthy that the effect
of such mechanisms allows to impact the traffic structure by changing its nature, and if self-similarity is already inherent
in the traffic, in some cases it is reinforced [Lel94]. However, it is difficult to imagine that based on such factors,
selfsimilarity can occur independently. The emergence of fractal properties of traffic at the application level is possible only
where the source itself is a chaotic dynamic system generating traffic with self-similarity properties, which is unlikely.
[Yaz06]</p>
      <p>Numerous measurements have demonstrated that such traffic structure is not an irrelevant side effect but a unique
feature developed within the existing distributed network structures with intermediate accumulation, which include
modern transport and telecommunications networks. Therefore, it is natural to believe that self-similarity is based on just
one causative factor, which, despite the diversity of manifested forms, incorporates their entirety, by the same method of
information processing [Lel94]. Hence, self-similarity is an inherent property of packet networks.</p>
      <p>The statistical properties of flow packets are determined by the following factors [Lel94, Mil03]:
1. Randomly nature of traffic as a bit stream generated by the information source.
2. Specifics of the transformation of the bit stream into the packet stream subject to the technological mechanisms of
transformation.
3. Task-specific transformation of the flow in course of aggregation in order to improve quality indicators.</p>
      <p>Since in such three cases the packets arrive irregularly, the time interval between successive arrivals of packets is a
random value [Mil03]. The statistical characteristics and the structure of the received packet stream, in turn, are affected
by a range of factors [Lel94]:
a) Specifics of operating systems with time division. Each process in the system developing in the "virtual time",
primarily subject to the available resources. Within the process of transmitting information from the application to the
link level, the time intervals between the phases of the pack formation are uneven, even if the generated data flow is
uniform.
b) The dynamics of the information application work using the means of interworking is an important factor in
determining the nature of an aggregated data stream. An application may generate data at a rate determined by the
available resources (buffer memory and bandwidth of the communication channels).
c) Implementation of the transport layer protocol. It provides reliable packet delivery and regulation of their rates with
the use of a closed feedback loop between the receiver and the data source.
d) Features of link level protocols, such as collision, occurring at the division of the transmission medium increase the
time intervals between the packets with the growing link loads. This is particularly evident in networks using TCP/IP
protocols implementing "window management". According to [She11], the traffic not exhibiting any self-similar
properties previously, having gone through the network hubs is transformed into a network fractal.
e) Characteristics and administrative restrictions imposed on the intermediate network nodes in order to ensure the
specified service quality parameters.</p>
      <p>More complex relations in a data stream arise with the use of ATM and Frame Relay protocols which imply
integrated quality control functions for virtual connections using buffering, prioritization and protection strategies
[Lel94]. In this case, traffic shaping is focused on changing the flow packet characteristics compounding the virtual path
or channel so as to reduce the peak rate, limit the pack length or reduce the delay time by arranging the pack in time, as
well as to plan the traffic (Traffic Shaping). The right for traffic shaping is provided to both network operators and users
in order to agree on its parameters, passing through the "user network" interface, with an agreement on the traffic. For
network operators, traffic shaping becomes an effective method of the optimal use of network resources by the
"delayperformance" criterion [Lel94].</p>
      <p>One of the properties of multiservice traffic is its structural complexity, which is characterized by the variation
coefficient c(). The variation coefficient c() is the dispersion characteristic of the pack flow defined as the ratio of the
mean standard deviation () of the values of time intervals between the arrival of successive packets to their expected
value m(), i.e. с( )  ( ) / m( )</p>
      <p>Multi-service transport packet streams of modern telecommunication networks are characterized by transiency and
self-similarity, which, unlike the pack flows with Poisson distribution, have a variation coefficient greater than one, i.e.
c( )  1 . According to [Čuč09], the efficiency of using network resources for the traffic with the packet stream with
Poisson distribution is much higher than the self-similar packet stream with the properties mainly described by Hurst
coefficient H.</p>
      <p>The work proposes a model, based on the functional conversion used to reduce the structural complexity of the
selfsimilar input stream pack and to obtain a stream with the elementary stream properties and the variation coefficient is
equal to one.</p>
    </sec>
    <sec id="sec-3">
      <title>3 Problem Statement</title>
      <p>Based on the research target, we assume that the input packet stream G (τ1) is subjected to the identification by the
known analytical techniques so as to determine its self-similar properties. We assume that the identification established
the time intervals distribution density between the packets G (τ1) as described by the Pareto Law. The function mapping
link of the switching node converts the distribution density of time intervals between flow packs G (τ1), into the
exponential law G (τ2).</p>
      <p>As a result of the function mapping of the density distribution of time intervals between flow packs G (τ1), its
structural complexity was reduced to one, creating stream G (τ2) with the properties of the elementary stream.</p>
      <p>It is required to:
1. Develop a model converting the input packet stream G (τ1) with the distribution density of time intervals between
packs as per the Pareto Law and structural complexity c( 1 )  1 , into the flow G (τ2) with the density of time intervals
distribution between packs described the an exponential distribution law and with the structural complexity of c( 2 )  1 .
2. Find a functional link between the Hurst exponent and the variation coefficient determining the structural complexity
of the input packet stream with known self-similar properties.</p>
      <p>To ensure the solution accuracy we have introduced limitations:
1. Pack length L0 is a fixed value;
2. The length of the time interval τi is determined by the time of the pack forming in the buffer;
3. At relatively low values of the pack length L0 with a small error, the mean value of the process rate rср may be
replaced by the instantaneous rate r(t) in the interval, i.e. rср = r(t);
4. The average value of the process rate in the interval τ generates a pack with the length L0, i.e. rср   = Lо;
5. The random variable Z has a distribution with a heavy tail, if the probability is PZ  x cx a , x   , where 0  a  2
is a tail index or a shape parameter, c is a positive constant [She11];
6. The correlation function R( t1 ,t2 )  M ( X( t1 )  m )( X( t2 )  m ) is invariant with respect to the burst shift, i.e. that is,
R( t1 ,t2 )  R( t1  k ,t2  k ) for any t1 ,t2 ,k  Z . It is expected that the first two points exist and are finite: m  M X ( t ) ,
 2  M X ( t )  m . Here, M (  ) is the averaging operation; m is the first central point;  2 is the dispersion of process X
(t);
R( k ) </p>
      <p>( k  1)2H  2k 2H  ( k 1)2H  for any k  1 .
7. Random process X (t) is exactly self-similar to the second-order process with the Hurst exponent H (1/2 &lt;H &lt;1), if
 2
2
8. The conversion function of the probability density of time intervals between packs ( x ) is a single-valued
differentiable function for which there is a known inverse function x  ( y ) .
9. If at the function conversion of the probability density of time intervals, the invariance property of probability
differential is performed between packs, the probability of such two events are equal g(y)dy  f(x)dx .</p>
    </sec>
    <sec id="sec-4">
      <title>4 Solution</title>
      <sec id="sec-4-1">
        <title>4.1 Model Transformation of Self-Similar Stream into Poisson Stream Packs</title>
        <p>Since the random variables x and y are linked by a single-valued differentiable functional dependence, we base our
calculations on the fact that the obtained random variables X, lie in the interval [x, x +dx]. Therefore, value y is also in
the interval [y, y + dy], where y ( x ) , and dy  ( x )dx .</p>
        <p>Since such conditions ensure the invariance property of the probability differential, the probability of such two events
equal</p>
        <p>According to formula (1) ,
g(y)dy  f(x)dx
dx
dy
g(y)  f(x)
 f [ ( y )]  ( y ) .
(1)
(2)</p>
        <p>The analytical expression for the function y= f(x) indicating the definition domain х plays a key role in the synthesis
of random values distribution law. Therefore, within the class of differentiable functions,</p>
        <p>y ( х ) , (3)
It is essential to define the functions which would ensure resulting g(y) functions with desired characteristics.</p>
        <p>When transformations traffic distribution laws, the information transfer rate available to the user of the i - th transport
network service is a stochastic value. Therefore, it is an aggregate of time functions and has a probabilistic description.
Relevant probability characteristics can be unconditional and joint probability density of random variables which are
point functions of the process for a fixed time. Moreover, their aggregate (for example, the bit rate of data transfer) is an
ensemble where any component is a selective function of a random process rk(t), related to a particular session [Lel94].
The values of its implementation at some point of time ti define the random variable R i(k) . [Mil03] For packet switching,
the bitstream is converted into a discrete series of packets, generally of variable duration [Lel94, Mil03].</p>
        <p>For quantitative analysis, we confine to the fixed package length L. In this case, the traffic structure is completely
determined by the distribution of the time intervals duration between transmitted packets [Lel94, Fra10]. The interval
length  is determined by the time of the information accumulation in the buffer, sufficient to form a packet of
predetermined length L0 [Lel94]:
ti τ
 r(t) dt  Lo . (4)
ti</p>
        <p>The left side of formula (4) is the average rate over the interval , multiplied by the interval length, i.e., [Lel94,
Mil03]</p>
        <p>1 ti T
where rср    r( t )dt .</p>
        <p>r ti</p>
        <p>For relatively small values of L0 packet length with a small error of rср , we replace the current rate value in the 
interval, i.e. rср = r. This assumption makes allows to find a functional dependence between random variables  and r
[Lel94, Mil03]:</p>
        <p>and, therefore, to determine the distribution law g () for a continuous random variable  as a function of one random
argument r, if its distribution law f (r) is known.</p>
        <p>Let us consider the case where the initial probability density describes the distribution of the instantaneous values of a
random process. The random variable  is linked to it through functional dependence (6) and defines the nature of the
transformation. The result of the transformation is a package in the pool, and the random variable   , where  is the
time interval between packets, a random variable, and the law of the  value distribution fully describes the statistical
properties of the packet flow, therefore</p>
        <p>  (r) . (7)</p>
        <p>The relation between the instantaneous values of the random process r( t) and the time interval between the 
packages generated in this manner can be rewritten in the form [Jag96, Alt07]:
and the distribution density of time intervals between packets is determined by the formula:</p>
        <p>g( )  G( )   ( )  f [ ( )].</p>
        <p>In (8) a is the lower threshold parameter determined by the normalization condition:</p>
        <p>A distinctive feature of the dependence between random variables r and  is the invariance with respect to the partial
replacement of function and argument (inverse ratio). This dependence may be expressed through generalized variables
y=k/x which allows to consider the distribution law (9) as inverse transformation:</p>
        <p>Then the model of a self-similar flow under Pareto law being converted into a Poisson packet stream may be obtained
from the following rationale. Let the continuous random variable  1 with distribution density f ( 1 ) is being transformed
as  2 ( 1 ) . The selected function ( 1 ) should ensure the transformation result is coherent with the law of
distribution [Lin11, Mao05]
rср.   L ,</p>
        <p>0
 </p>
        <p>L</p>
        <p>.
 1 F( 1 )</p>
        <p> 1 F( 1 )
 k 
F( 1 )  1 
 1  ,

G( 1 ) 
k</p>
        <p>1 ,
1 rnd(1)а
where  2 is the length of the interval between packets.</p>
        <p>According to (1), the distribution functions should be equal, i.e.</p>
        <sec id="sec-4-1-1">
          <title>Therefore [Mik15]</title>
          <p>
            By solving (12) with regard to  2 , we receive F( 1 )  1 e2 . By differentiating (12) by  1 we receive [Maz14,
Fra10]
(12)
(13)
(
            <xref ref-type="bibr" rid="ref13">14</xref>
            )
          </p>
        </sec>
      </sec>
      <sec id="sec-4-2">
        <title>4.2 Determining the Functional Connection Between the Hurst Exponent, and Variation</title>
      </sec>
      <sec id="sec-4-3">
        <title>Coefficient</title>
        <p>Let us consider an input packet stream G (τ1) with having a distribution density of time intervals between packets f
(τ1) and self-similar properties. To be specific, we demonstrate a solution to this problem for the selection length of the
input flow G (τ1), comprising 1,000,000 packets with the distribution density of time intervals between Pareto packets
with known self-similar properties (Hurst exponent H = 0.8), with an integral distribution function as follows:
where k is the lower threshold, a is the form index.</p>
        <p>To generate random variables with Pareto distribution, we use the approach described in [She07, Fra09]. The task is
to find the inverse function of the integrated distribution function [She07]:</p>
        <p>where rnd (1) is a random variable uniformly distributed within the interval [0,1]. The parameter a is linked to the
Hurst exponent by the dependence [She07] a  3  2H.</p>
        <p>For the exponential networks, the distribution of time intervals between packets is determined by the formula
F( 2 )  1 exp(  2 ), where λ is the controlled packet flowrate [She07, Fra09].</p>
        <p>For simulation of the Poisson law of time intervals distribution between packets, use the formula [She07, Lel94]:
1

G( 2 )  </p>
        <p>ln1 rnd(1) .</p>
        <p>Having defined the numerical value of the input stream packets G (τ1): expectation, variance, standard deviation,
variation coefficient, the formula will be:
999999 999999
 Li ( 1 ) ( Li ( 1 )  M ( 1 ))2
M ( 1 )  i0 , M ( 1 )  3,421 ; D( 1 )  i0 , D( 1 )  177,056 ;</p>
        <p>1000000 1000000
 ( 1 ) </p>
        <p>D( 1 ) , ( 1 )  13,306 ; с( 1 )   ( 1 ) / m( 1 ), c( 1 )  3.89 .</p>
        <p>For traffic with Hurst exponent H = 0.8, the variation coefficient was much greater than one. Fig. 1 demonstrates the
dependencies: the variation coefficient of the Hurst exponent of the input flow G (τ1), the relation between the intensity
of the exponential law and the variation coefficient of the input stream, as well as the dependence of the Pareto law form
value and the intensity of the exponential law at equal mathematical expectations.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5 Example</title>
      <p>As an example, we consider the transformation of the Pareto distribution law into the exponential law, the simulation
results are shown in Table. 1 [Fra10].
To assess the significance of regression parameters and correlation, first:
- the mean value of the variation coefficient is as follows:
98.001</p>
      <p> 3.3793
29
- auxiliary variables are listed in Table 2, where,
 i  с( r )i  ˆс( r )i ,  i   i  i1 , Ai  
с( 1 )i  сˆ( 1 )i
с( 1 )i</p>
      <p>Ai  i (  i )2
( c( r )i  cˆ( r )i )2 0.7571  0.9985
( c( r )i  c( r )i )2  1 253.4779</p>
      <sec id="sec-5-1">
        <title>Calculation of the determination index:</title>
        <p>R2  0.99852  0.997
Use the values in Table 2 to determine the average error of approximation of the variation coefficient</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [She07]
          <string-name>
            <surname>Sheluhin</surname>
            <given-names>O.I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Smolskiy</surname>
            <given-names>S.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Osin</surname>
            <given-names>A.V.</given-names>
          </string-name>
          <article-title>Self-similar processes in telecommunications</article-title>
          . - John Wiley &amp; Sons,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [Lel94]
          <string-name>
            <given-names>W. E.</given-names>
            <surname>Leland</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. S.</given-names>
            <surname>Taqqu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Willinger</surname>
          </string-name>
          and
          <string-name>
            <given-names>D. V.</given-names>
            <surname>Wilson</surname>
          </string-name>
          ,
          <article-title>On the self-similar nature of Ethernet traffic (Extended version)</article-title>
          ,
          <source>IEEE/ACM Transactions on Networking</source>
          , Vol.
          <volume>2</volume>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>15</lpage>
          ,
          <year>1994</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [Yaz06]
          <string-name>
            <surname>Yazıcı</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          <string-name>
            <surname>Izzetoglu</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Onaral</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Bilgutay</surname>
          </string-name>
          , N. “
          <article-title>Kalman filtering for self-similar processes”</article-title>
          . (
          <year>2006</year>
          ).
          <source>Signal Processing</source>
          <volume>86</volume>
          ,
          <fpage>760</fpage>
          -
          <lpage>775</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <string-name>
            <surname>[Mil03] Miloucheva</surname>
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Műller</surname>
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Anzaloni</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <article-title>A practical appoach to forecast Quality of Service parameters considering outliers</article-title>
          .
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [Čuč09]
          <string-name>
            <given-names>Ž.</given-names>
            <surname>Čučej</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Fras</surname>
          </string-name>
          ,
          <article-title>Data source statistics modeling based on measured packet traffic : a case study of protocol algorithm and analytical transformation approach</article-title>
          ,
          <source>TELSIKS</source>
          <year>2009</year>
          , 9th International Conference on Telecommunications in Modern Satellite, Cable and
          <string-name>
            <given-names>Broadcasting</given-names>
            <surname>Services</surname>
          </string-name>
          , Serbia, Niš,
          <fpage>7</fpage>
          -9 October,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <string-name>
            <surname>[Fra10] M. Fras</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <article-title>Mohorko and Ž</article-title>
          . Čučej,
          <article-title>Modeling of captured network traffic by the mimic defragmentation process</article-title>
          ,
          <source>Simulation: Transactions of The Society for Modeling and Simulation International</source>
          , San Diego, USA,
          <source>Published online 20 September</source>
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [Mik15]
          <string-name>
            <surname>Mikova</surname>
            <given-names>S. Iu.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Oladko</surname>
            <given-names>V. S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nesterenko</surname>
            <given-names>M. A.</given-names>
          </string-name>
          <article-title>Podkhod k klassifikatsii anomalii setevogo trafika [The approach to classification of anomalies in network traffic]</article-title>
          .
          <source>Innovatsionnaia nauka</source>
          ,
          <year>2015</year>
          , no.
          <issue>11</issue>
          , pp.
          <fpage>78</fpage>
          -
          <lpage>80</lpage>
          (in Russian).
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [She11]
          <string-name>
            <surname>Shelukhin</surname>
            <given-names>O. I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Garmashev</surname>
            <given-names>A. V.</given-names>
          </string-name>
          <article-title>Obnaruzhenie DOS i DDOS-atak metodom diskretnogo veivlet-analiza [Detection DOS and DDOS attacks using discrete wavelet analysis]</article-title>
          .
          <source>T-Comm</source>
          ,
          <year>2011</year>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>44</fpage>
          -
          <lpage>46</lpage>
          (in Russian).
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [Jag96]
          <string-name>
            <given-names>D.L.</given-names>
            <surname>Jagerman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Melamed</surname>
          </string-name>
          and
          <string-name>
            <given-names>W.</given-names>
            <surname>Willinger</surname>
          </string-name>
          ,
          <article-title>"Stochastic Modeling of Traffic Processes", invited chapter in Frontiers in Queueing: Models, Methods and</article-title>
          <string-name>
            <surname>Problems (J.H. Dshalalow</surname>
          </string-name>
          , Ed.), CRC Press,
          <year>1996</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [Alt07]
          <string-name>
            <given-names>T.</given-names>
            <surname>Altiok</surname>
          </string-name>
          and
          <string-name>
            <given-names>B.</given-names>
            <surname>Melamed</surname>
          </string-name>
          ,
          <source>Simulation Modeling and Analysis with Arena</source>
          , Academic Press,
          <year>2007</year>
          (456 pages),
          <source>ISBN 978-0-12-370523-5.</source>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          <string-name>
            <surname>[Lin11] Linets</surname>
            <given-names>G.I.</given-names>
          </string-name>
          :
          <article-title>Methods of structural and parametric synthesis, identification and management of transportation telecommunication networks for maximum performance</article-title>
          . // Monograph. - Stavropol,
          <year>2011</year>
          . - 384 p.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [Mao05]
          <string-name>
            <surname>Mao</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          “
          <article-title>A Timescale Decomposition Approach to Network Traffic Prediction”</article-title>
          . (
          <year>2005</year>
          ).
          <source>IEICE Trans. Commun</source>
          . Vol E88-B, No.
          <volume>10</volume>
          ,
          <fpage>3974</fpage>
          -
          <lpage>3981</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          <string-name>
            <surname>[Maz14] Mazurek</surname>
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dymora</surname>
            <given-names>P</given-names>
          </string-name>
          .
          <article-title>Network anomaly detection based on the statistical self-similarity factor for HTTP protocol</article-title>
          .
          <source>Przegląd Elektrotechniczny</source>
          ,
          <year>2014</year>
          , vol.
          <volume>90</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>127</fpage>
          -
          <lpage>130</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          <string-name>
            <surname>[Fra10] M. Fras</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <article-title>Mohorko and Ž</article-title>
          . Čučej,
          <article-title>Modeling of measured self-similar network traffic in OPNET simulation tool</article-title>
          , Inf. MIDEM,
          <volume>40</volume>
          (
          <issue>3</issue>
          ):
          <fpage>224</fpage>
          -
          <lpage>231</lpage>
          ,
          <year>September 2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          <string-name>
            <surname>[Fra09] M. Fras</surname>
          </string-name>
          ,
          <article-title>Methods for the statistical modeling of measured network traffic for simulation purposes</article-title>
          ,
          <source>Ph.D. thesis</source>
          ,
          <year>2009</year>
          , Maribor, Slovenia.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>