{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T16:28:58Z","timestamp":1768408138701,"version":"3.49.0"},"reference-count":48,"publisher":"Elsevier BV","issue":"14","license":[{"start":{"date-parts":[[2008,10,1]],"date-time":"2008-10-01T00:00:00Z","timestamp":1222819200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[2008,10]]},"DOI":"10.1016\/j.comnet.2008.05.004","type":"journal-article","created":{"date-parts":[[2008,5,29]],"date-time":"2008-05-29T10:46:48Z","timestamp":1212058008000},"page":"2645-2662","source":"Crossref","is-referenced-by-count":72,"title":["Internet traffic modeling by means of Hidden Markov Models"],"prefix":"10.1016","volume":"52","author":[{"given":"Alberto","family":"Dainotti","sequence":"first","affiliation":[]},{"given":"Antonio","family":"Pescap\u00e9","sequence":"additional","affiliation":[]},{"given":"Pierluigi Salvo","family":"Rossi","sequence":"additional","affiliation":[]},{"given":"Francesco","family":"Palmieri","sequence":"additional","affiliation":[]},{"given":"Giorgio","family":"Ventre","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.comnet.2008.05.004_bib1","doi-asserted-by":"crossref","unstructured":"A. Dainotti, A. Pescap\u00e9, P. Salvo Rossi, G. Iannello, F. Palmieri, G. Ventre, An HMM approach to internet traffic modeling, in: Proc. of IEEE GLOBECOM, November 2006, pp. 1\u20136.","DOI":"10.1109\/GLOCOM.2006.453"},{"key":"10.1016\/j.comnet.2008.05.004_bib2","doi-asserted-by":"crossref","unstructured":"A. Dainotti, A. Pescap\u00e9, G. Ventre, A packet-level characterization of network traffic, in: Proc. of IEEE CAMAD, June 2006, pp. 38\u201345.","DOI":"10.1109\/CAMAD.2006.1649716"},{"key":"10.1016\/j.comnet.2008.05.004_bib3","doi-asserted-by":"crossref","unstructured":"B.A. Mah, An empirical model of HTTP network traffic, Proc. of IEEE INFOCOM, vol. 2, April 1997, pp. 592\u2013600.","DOI":"10.1109\/INFCOM.1997.644510"},{"key":"10.1016\/j.comnet.2008.05.004_bib4","doi-asserted-by":"crossref","unstructured":"J. Cao, W.S. Cleveland, Y. Gao, K. Jeffay, F.D. Smith, M.C. Weigle, Stochastic models for generating synthetic http source traffic, in: Proc. of IEEE INFOCOM, vol. 3 2004, pp. 1546\u20131557.","DOI":"10.1109\/INFCOM.2004.1354568"},{"key":"10.1016\/j.comnet.2008.05.004_bib5","unstructured":"R. Ohri, E. Chlebus, Measurement based e-mail traffic characterization, in: Proc. of Int. Symp. on Performance Evaluation of Computer and Telecommunication Systems (SPECTS), Philadelphia, PA, July 2005."},{"issue":"3","key":"10.1016\/j.comnet.2008.05.004_bib6","doi-asserted-by":"crossref","first-page":"488","DOI":"10.1109\/TNET.2005.850221","article-title":"A traffic characterization of popular on-line games","volume":"13","author":"Feng","year":"2005","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"10.1016\/j.comnet.2008.05.004_bib7","unstructured":"<http:\/\/www.grid.unina.it\/software\/ITG>, September 2007."},{"key":"10.1016\/j.comnet.2008.05.004_bib8","series-title":"Network Game Traffic Modelling, NetGames2002","author":"Farber","year":"2002"},{"key":"10.1016\/j.comnet.2008.05.004_bib9","doi-asserted-by":"crossref","unstructured":"R. Bangun, E. Dutkiewicz, Modelling multi-player games traffic, in: Proc. of International Conference on Information Technology: Coding and Computing, 27\u201329 March 2000, pp. 228\u2013233.","DOI":"10.1109\/ITCC.2000.844216"},{"issue":"4","key":"10.1016\/j.comnet.2008.05.004_bib10","doi-asserted-by":"crossref","first-page":"403","DOI":"10.1016\/S0140-3664(99)00197-8","article-title":"Source models of network game traffic","volume":"23","author":"Borella","year":"2000","journal-title":"Computer Communications"},{"key":"10.1016\/j.comnet.2008.05.004_bib11","unstructured":"T. Lang, G.J. Armitage, P. Branch, H. Choo, A synthetic traffic model for half-life, in: Proc. of Australian Telecommunication Networks and Application Conference 2003 (ATNAC 2003), Melbourne, Australia, December 2003."},{"issue":"October","key":"10.1016\/j.comnet.2008.05.004_bib12","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1016\/j.comnet.2003.10.004","article-title":"Modeling IP traffic: joint characterization of packet arrivals and packet sizes using BMAPs","volume":"44","author":"Salvador","year":"2004","journal-title":"Elsevier Computer Networks"},{"issue":"2","key":"10.1016\/j.comnet.2008.05.004_bib13","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1016\/S0166-5316(03)00067-1","article-title":"Modeling IP traffic using the batch Markovian arrival process","volume":"54","author":"Klemm","year":"2003","journal-title":"Performance Evaluation Journal"},{"key":"10.1016\/j.comnet.2008.05.004_bib14","unstructured":"J. Gao, I. Rubin, Multifractal analysis and modeling of long-range-dependent traffic, in: Proc. of IEEE ICC, June 1999, pp. 382\u2013386."},{"issue":"5","key":"10.1016\/j.comnet.2008.05.004_bib15","doi-asserted-by":"crossref","first-page":"719","DOI":"10.1109\/49.700908","article-title":"A Markovian approach for modeling packet traffic with long-range dependence","volume":"16","author":"Andersen","year":"1998","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"10.1016\/j.comnet.2008.05.004_bib16","doi-asserted-by":"crossref","unstructured":"K. Salamatian, S. Vaton, Hidden Markov Modeling for network communication channels, in: Proc. of ACM SIGMETRICS 2001, vol. 29, 2001, pp. 92\u2013101.","DOI":"10.1145\/384268.378439"},{"issue":"1\u20134","key":"10.1016\/j.comnet.2008.05.004_bib17","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1016\/S0166-5316(02)00122-0","article-title":"Continuous-time Hidden Markov Models for network performance evaluation","volume":"49","author":"Wei","year":"2002","journal-title":"Performance Evaluation"},{"issue":"2","key":"10.1016\/j.comnet.2008.05.004_bib18","doi-asserted-by":"crossref","first-page":"530","DOI":"10.1109\/TSP.2005.861066","article-title":"Joint end-to-end loss-delay Hidden Markov Model for periodic UDP traffic over the Internet","volume":"54","author":"Salvo Rossi","year":"2006","journal-title":"IEEE Transactions on Signal Processing"},{"key":"10.1016\/j.comnet.2008.05.004_bib19","doi-asserted-by":"crossref","unstructured":"G. Iannello, F. Palmieri, A. Pescap\u00e8, P. Salvo Rossi, End-to-end packet-channel Bayesian model applied to heterogeneous wireless networks, in: Proc. of IEEE GLOBECOM, November 2005, pp. 484\u2013489.","DOI":"10.1109\/GLOCOM.2005.1577673"},{"issue":"16","key":"10.1016\/j.comnet.2008.05.004_bib20","doi-asserted-by":"crossref","first-page":"1835","DOI":"10.1016\/j.comcom.2005.02.012","article-title":"Markov models of internet traffic and a new hierarchical MMPP model","volume":"28","author":"Muscariello","year":"2005","journal-title":"Computer Communications Journal"},{"issue":"1","key":"10.1016\/j.comnet.2008.05.004_bib21","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1016\/S0166-5316(96)00054-5","article-title":"Simple and efficient models for variable bit rate MPEG video traffic","volume":"30","author":"Rose","year":"1997","journal-title":"Performance Evaluation Journal"},{"key":"10.1016\/j.comnet.2008.05.004_bib22","doi-asserted-by":"crossref","unstructured":"E. Costamagna, L. Favalli, F. Tarantola, Modeling and analysis of aggregate and single stream internet traffic, in: Proc. of IEEE GLOBECOM, December 2003, pp. 3830\u20133834.","DOI":"10.1109\/GLOCOM.2003.1258948"},{"key":"10.1016\/j.comnet.2008.05.004_bib23","doi-asserted-by":"crossref","unstructured":"C. Wright, F. Monrose, G. Masson, HMM profiles for network traffic classification, in: Proc. of VizSEC\/DMSEC, October 2004, pp. 9\u201315.","DOI":"10.1145\/1029208.1029211"},{"key":"10.1016\/j.comnet.2008.05.004_bib24","unstructured":"<http:\/\/www.grid.unina.it\/Traffic\/>, September 2007."},{"issue":"2","key":"10.1016\/j.comnet.2008.05.004_bib25","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1109\/5.18626","article-title":"A tutorial on Hidden Markov Models and selected applications in speech recognition","volume":"77","author":"Rabiner","year":"1989","journal-title":"Proceedings of the IEEE"},{"key":"10.1016\/j.comnet.2008.05.004_bib26","unstructured":"J.A. Bilmes, A Gentle Tutorial of the EM Algorithm and its Application to Parameter Estimation for Gaussian Mixture and Hidden Markov Models, University of Berkeley, CA, Technical Report ICSI-TR-97-021, 1998."},{"issue":"5","key":"10.1016\/j.comnet.2008.05.004_bib27","doi-asserted-by":"crossref","first-page":"729","DOI":"10.1109\/TIT.1982.1056544","article-title":"Maximum likelihood estimation for multivariate observations of Markov sources","volume":"IT-28","author":"Liporace","year":"1982","journal-title":"IEEE Transactions on Information Theory"},{"issue":"2","key":"10.1016\/j.comnet.2008.05.004_bib28","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1109\/TIT.1986.1057145","article-title":"Maximum likelihood estimation for multivariate mixture observations of Markov chains","volume":"IT-32","author":"Juang","year":"1986","journal-title":"IEEE Transactions on Information Theory"},{"key":"10.1016\/j.comnet.2008.05.004_bib29","series-title":"Introduction to Stochastic Processes","author":"\u00c7inlar","year":"1975"},{"key":"10.1016\/j.comnet.2008.05.004_bib30","unstructured":"<http:\/\/nile.wpi.edu\/downloads>, September 2007."},{"issue":"4","key":"10.1016\/j.comnet.2008.05.004_bib31","doi-asserted-by":"crossref","first-page":"1621","DOI":"10.1109\/MNET.2006.1668399","article-title":"A study of Internet instant messaging and chat protocols","volume":"20","author":"Jennings","year":"2006","journal-title":"IEEE Network"},{"key":"10.1016\/j.comnet.2008.05.004_bib32","unstructured":"X. Zhen, G. Lei, J. Tracey, Understanding instant messaging traffic characteristics, in: Proc. of the 27th International Conference on Distributed Computing Systems (IEEE ICDCS 2007), Toronto, Canada, 25\u201329 June 2007."},{"key":"10.1016\/j.comnet.2008.05.004_bib33","unstructured":"S. McCreary, K. Claffy, Trends in wide area IP traffic patterns \u2013 a view from Ames Internet Exchange, in: Proc. of ITC Specialist Seminar of Measurement and Modeling of IP Traffic, September 2000, pp. 1\u201311."},{"key":"10.1016\/j.comnet.2008.05.004_bib34","unstructured":"<http:\/\/www.microsoft.com\/games\/ageofmythology\/>, September 2007."},{"key":"10.1016\/j.comnet.2008.05.004_bib35","unstructured":"<http:\/\/www.comscore.com\/>, September 2007."},{"key":"10.1016\/j.comnet.2008.05.004_bib36","unstructured":"<http:\/\/join.msn.com\/messenger\/overview>, September 2007."},{"key":"10.1016\/j.comnet.2008.05.004_bib37","unstructured":"<http:\/\/www.microsoft.com\/technet\/prodtechnol\/isa\/2000\/maintain\/isaimsec.mspx>, September 2007."},{"key":"10.1016\/j.comnet.2008.05.004_bib38","unstructured":"<http:\/\/www.hypothetic.org\/docs\/msn\/general\/overview.php>, September 2007."},{"issue":"1","key":"10.1016\/j.comnet.2008.05.004_bib39","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1016\/j.comnet.2005.04.008","article-title":"The effect of latency on user performance in real-time strategy games","volume":"49","author":"Claypool","year":"2005","journal-title":"Elsevier Computer Networks"},{"key":"10.1016\/j.comnet.2008.05.004_bib40","doi-asserted-by":"crossref","unstructured":"A. Dainotti, A. Botta, A. Pescap\u00e9, G. Ventre, Searching for invariants in network games traffic, in: Proc. of ACM Co-Next 2006 Student Workshop, Lisboa, Portugal, December 2006.","DOI":"10.1145\/1368436.1368488"},{"key":"10.1016\/j.comnet.2008.05.004_bib41","unstructured":"S. McCanne, V. Jacobson, The BSD packet filter: a new architecture for user level packet capture, in: Proc. of Winter 1993 USENIX, January 1993, pp. 259\u2013269."},{"key":"10.1016\/j.comnet.2008.05.004_bib42","doi-asserted-by":"crossref","unstructured":"T. Karagiannis, A. Broido, M. Faloutsos, K. Claffy, Transport layer identification of P2P traffic, in: Proc. of ACM SIGCOMM IMC, October 2004, pp. 121\u2013134.","DOI":"10.1145\/1028788.1028804"},{"key":"10.1016\/j.comnet.2008.05.004_bib43","unstructured":"<http:\/\/www.wide.ad.jp\/wg\/mawi\/>, September 2007."},{"issue":"4","key":"10.1016\/j.comnet.2008.05.004_bib44","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1145\/115994.116003","article-title":"Characteristics of wide-area TCP\/IP conversations","volume":"21","author":"Caceres","year":"1991","journal-title":"ACM SIGCOMM Computer Communication Review"},{"issue":"1","key":"10.1016\/j.comnet.2008.05.004_bib45","first-page":"1","article-title":"An empirical workload model for driving wide-area TCP\/IP network simulations","volume":"3","author":"Danzig","year":"1992","journal-title":"Journal of Internetworking: Research and Experience"},{"key":"10.1016\/j.comnet.2008.05.004_bib46","doi-asserted-by":"crossref","unstructured":"F.D. Smith, F.H. Campos, K. Jeffay, D. Ott, What TCP\/IP procotol headers can tell us about the Web, in: Proc. of ACM SIGMETRICS, June 2001, pp. 245\u2013256.","DOI":"10.1145\/384268.378789"},{"key":"10.1016\/j.comnet.2008.05.004_bib47","doi-asserted-by":"crossref","unstructured":"A. Dainotti, A. Pescap\u00e9, G. Ventre, A packet-level model of Starcraft traffic, in: Proc. of IEEE Hot-P2P, July 2005, pp. 33\u201342.","DOI":"10.1109\/HOT-P2P.2005.4"},{"issue":"3","key":"10.1016\/j.comnet.2008.05.004_bib48","doi-asserted-by":"crossref","first-page":"305","DOI":"10.2307\/1269107","article-title":"Estimating model discrepancy","volume":"32","author":"Pederson","year":"1990","journal-title":"Technometrics"}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S138912860800162X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S138912860800162X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,1,30]],"date-time":"2025-01-30T13:24:41Z","timestamp":1738243481000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S138912860800162X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,10]]},"references-count":48,"journal-issue":{"issue":"14","published-print":{"date-parts":[[2008,10]]}},"alternative-id":["S138912860800162X"],"URL":"https:\/\/doi.org\/10.1016\/j.comnet.2008.05.004","relation":{},"ISSN":["1389-1286"],"issn-type":[{"value":"1389-1286","type":"print"}],"subject":[],"published":{"date-parts":[[2008,10]]}}}