
After decades of rapid development, the scale and complexity of modern networks have far exceed our expectations. In many conditions, traditional traffic identification methods cannot meet the demand of modern networks. Recently, fine-grained network traffic identification has been proved to be an effective solution for managing network resources. There is a massive increase in the use of fine-grained network traffic identification in the communications industry. In this article, we propose a comprehensive overview of fine-grained network traffic identification. Then, we conduct a detailed literature review on fine-grained network traffic identification from three perspectives: wired network, mobile network, and malware traffic identification. Finally, we also draw the conclusion on the challenges of fine-grained network traffic identification and future research prospects.
Citation: Xiaolin Gui, Yuanlong Cao, Ilsun You, Lejun Ji, Yong Luo, Zhenzhen Luo. A Survey of techniques for fine-grained web traffic identification and classification[J]. Mathematical Biosciences and Engineering, 2022, 19(3): 2996-3021. doi: 10.3934/mbe.2022138
[1] | Md Nazmul Hassan, Angela Peace . Mechanistically derived Toxicant-mediated predator-prey model under Stoichiometric constraints. Mathematical Biosciences and Engineering, 2020, 17(1): 349-365. doi: 10.3934/mbe.2020019 |
[2] | Lale Asik, Jackson Kulik, Kevin Long, Angela Peace . Dynamics of a stoichiometric producer-grazer system with seasonal effects on light level. Mathematical Biosciences and Engineering, 2019, 16(1): 501-515. doi: 10.3934/mbe.2019023 |
[3] | Yang Kuang, Jef Huisman, James J. Elser . Stoichiometric Plant-Herbivore Models and Their Interpretation. Mathematical Biosciences and Engineering, 2004, 1(2): 215-222. doi: 10.3934/mbe.2004.1.215 |
[4] | Guangyu Sui, Meng Fan, Irakli Loladze, Yang Kuang . The dynamics of a stoichiometric plant-herbivore model and its discrete analog. Mathematical Biosciences and Engineering, 2007, 4(1): 29-46. doi: 10.3934/mbe.2007.4.29 |
[5] | Xinru Zhou, Xinmiao Rong, Meng Fan, Josué-Antonio Nescolarde-Selvaa . Stoichiometric modeling of aboveground-belowground interaction of herbaceous plant. Mathematical Biosciences and Engineering, 2019, 16(1): 25-55. doi: 10.3934/mbe.2019002 |
[6] | Lina Hao, Meng Fan, Xin Wang . Effects of nutrient enrichment on coevolution of a stoichiometric producer-grazer system. Mathematical Biosciences and Engineering, 2014, 11(4): 841-875. doi: 10.3934/mbe.2014.11.841 |
[7] | Ming Chen, Meng Fan, Congbo Xie, Angela Peace, Hao Wang . Stoichiometric food chain model on discrete time scale. Mathematical Biosciences and Engineering, 2019, 16(1): 101-118. doi: 10.3934/mbe.2019005 |
[8] | Md Nazmul Hassan, Kelsey Thompson, Gregory Mayer, Angela Peace . Effect of Excess Food Nutrient on Producer-Grazer Model under Stoichiometric and Toxicological Constraints. Mathematical Biosciences and Engineering, 2019, 16(1): 150-167. doi: 10.3934/mbe.2019008 |
[9] | Yawen Yan, Hongyue Wang, Xiaoyuan Chang, Jimin Zhang . Asymmetrical resource competition in aquatic producers: Constant cell quota versus variable cell quota. Mathematical Biosciences and Engineering, 2023, 20(2): 3983-4005. doi: 10.3934/mbe.2023186 |
[10] | Yuanshi Wang, Hong Wu . Transition of interaction outcomes in a facilitation-competition system of two species. Mathematical Biosciences and Engineering, 2017, 14(5&6): 1463-1475. doi: 10.3934/mbe.2017076 |
After decades of rapid development, the scale and complexity of modern networks have far exceed our expectations. In many conditions, traditional traffic identification methods cannot meet the demand of modern networks. Recently, fine-grained network traffic identification has been proved to be an effective solution for managing network resources. There is a massive increase in the use of fine-grained network traffic identification in the communications industry. In this article, we propose a comprehensive overview of fine-grained network traffic identification. Then, we conduct a detailed literature review on fine-grained network traffic identification from three perspectives: wired network, mobile network, and malware traffic identification. Finally, we also draw the conclusion on the challenges of fine-grained network traffic identification and future research prospects.
In recent years, abnormal climate change has increasingly become the focus of attention. This abnormal change is mainly caused by global warming, including frequent low- temperature rain and snow weather, warm winter phenomenon, and regional increases in average precipitation, etc. One of the most important causes of global warming is the excessive human emission of greenhouse gases. In 2021, a climate report issued by the U.S. National Environmental Protection Agency (EPA) recognized for the first time that the climate change caused by human factors has exceeded natural factors [1]. To actively address the issue of abnormal climate change, the world has reached a consensus on reducing carbon emissions. According to the Energy and Climate Intelligence Unit (ECIU), 132 countries and regions around the world have set carbon neutrality targets to actively respond to abnormal climate change.
Under this background, China has also put forward the dual carbon target [2]. Which is "striving to achieve carbon peak by 2030 and achieve carbon neutrality by 2060", which helps the world build a community of shared future for mankind. Among them, carbon peak and carbon neutrality are noted as "dual carbon". Carbon peak means the process that carbon dioxide emission reaches the maximum value in a certain time interval, and then decreases steadily [3]. Carbon neutrality means that man-made carbon dioxide absorption offset man-made carbon dioxide emissions globally during the specified period, which is also known as "net zero CO2 emissions" [3]. It is a net value, which is different from the "zero emission" of carbon dioxide.
There are many factors affecting carbon emissions, including economic development, population, industrial structure, energy structure, energy efficiency, etc [4,5,6,7,8]. Urbanization has multi-dimensional meanings, mainly including population migration, economic development, spatial expansion, and improvement of living standards [9]. Moreover, in the process of urbanization, the labor force is transferred from the primary industry to the secondary industry and the tertiary industry. So the urbanization process is always accompanied by the above factors which affect carbon emissions. According to Emissions Gap Report 2020 issued by the United Nations Environment Programme (https://www.unep.org/emissions-gap-report-2020, Emissions Gap Report 2020, accessed on 11 November 2022), around two-thirds of global emissions are associated with private households. The report also shows the difference in carbon emissions between poor residents and rich residents, that is rich residents' carbon emissions are about twice that of poor residents. So cities are still the "main battlefield" of carbon emissions. It is of great significance to study the impact of urbanization on the dual carbon target of China.
There are many researches focus on the urbanization process, carbon emissions, and carbon absorption. Some research conclusions can summarize their relationship, the environmental Kuznets curve is one of the classic conclusions. Scholars' research on the delayed effect of urbanization and carbon emission usually uses econometrics methods, such as the 2SLS model, semi-parametric estimation model, Clustering model, etc [10,11,12,13]. However, there are relatively few studies that choose the differential equation model to analyze. Differential equations can describe many problems, especially after introducing time-delayed. Many problems can be described by delay differential equations, including biology, wireless electronics, ecology, and so on[14,15,16,17,18]. As we all know, there are relatively few studies that comprehensively discuss carbon emissions, carbon absorption, and urbanization. The majority of studies discuss carbon emissions and carbon absorption separately. So we intend to analyze them comprehensively. We consider that the emission and absorption of carbon are dynamic processes that change with time. Zhou et. al [19] found that there is a certain time delay in urban carbon emissions. The per capita carbon emissions in the previous stage have a positive influence on the per capita carbon emissions in the current stage. We consider that the carbon emissions brought by the urbanization process are related to both the current state and the past state. Thus we model a delayed differential equation, which can describe the dynamics phenomena of this content more accurately.
The rest of the paper is organized as follows. In Section 2, we use the analytic hierarchy process to analyze the influence weight of urbanization. In Section 3, we establish the delayed differential equation about carbon emissions and absorption, which considers the impact of the urbanization process of China. In Section 4, we analyze the existence and stability of the positive equilibrium of the model. We also analyze the dynamic properties near the equilibrium. In Section 5, we determine the range of parameters and carry out numerical simulations. Finally, the conclusions and suggestions are given in Section 6.
Analytic hierarchy process (AHP) is a multi-objective decision analysis method that combines qualitative analysis with quantitative analysis [20]. The main idea is to divide the influencing factors of the problem into several criteria and compare them with each other. By calculating the weight of the criteria, we can judge the importance of each factor. We build a hierarchical structure model which is shown in Figure 1. The model shows several key factors affecting carbon emissions, which come from the classic model for predicting carbon emissions, such as the STIRPAT model, kaya identity, etc [21,22].
First, we construct a judgment matrix. The value of rij is obtained according to the importance of target i compared with target j. We use the 1–9 scale method as the measurement standard. Through the current research status [23,24,25,26,27], we find that the four factors on the criterion layer have positive feedback on each other, then we compare the strength of the positive feedback of any two factors based on the current research. Thus, we can get the following judgment matrix R:
R=(131313113213121312121). |
Second, we determine the weight of each criterion. We calculate the eigenvector of matrix R. The component of the eigenvector is the weight of the influencing factor [28]. After normalization by column, we can get the weight of each criterion as
ω=(0.3760.1560.3450.123)T. |
The level of urbanization has the greatest weighting at 0.376. Thus we can preliminarily judge that the level of urbanization has a greater impact on carbon emissions than the other three factors.
Finally, we conduct a consistency test [29,30]. This step is to ensure that the judgment matrix is reasonable and there is no contradiction in the comparison process. We need the following data :
1) The maximum eigenvalue of the matrix R is λmax=14∑4i=1(Rω)iωi=4.1154.
2) Consistency indicators CI=λmax−nn−1=0.0385.
3) The random consistency index of the judgment matrix R is RI=0.89.
Since CR=CIRI=0.0433<0.1, we can accept the consistency of the judgment matrix R [30]. Through the above analysis, we conclude that the impact of the level of urbanization on carbon emissions is relatively greater.
In Section 2, we use the AHP method to analyze the impact of urbanization levels on carbon emissions. In this section, we establish a delayed differential equation model. Carbon emissions and carbon absorption are continuously changing quantities. Carbon peak means that the derivative of the equation describing the change of carbon emission is zero, and carbon neutrality means that the amount of carbon emissions is equal to the amount of carbon absorption. There is a time delay between urban internal construction (mainly ecological construction) and the urbanization process [19]. Therefore, in this paper, we model a delayed differential equation model, which is based on a logistic interspecific reciprocity model [31]. The absorption and emission of carbon are affected by the maximum environmental capacity, which follows the form of logistic. The model takes into account that carbon absorption is facilitated by carbon emissions, then inhibited by the maximum value of carbon absorption in a certain space; carbon emission is inhibited by environmental holding capacity, then facilitated by the urbanization process. But the promotion effect of carbon emissions on carbon absorption is not considered. The per capita carbon emissions in cities have a time delay effect [32], that is, the influence of the urbanization process on the growth rate of carbon emissions is related to both the carbon emissions y(t) at the current time t and the carbon emissions y(t−τ) at a certain time t−τ in the past. We denote this impact as v(y(t),y(t−τ)). To sum up, the rate of carbon emissions and carbon absorption follows the model:
{dxdt=r1x(1−xN1+αyN2),dydt=r2y(1−yN2)+v(y(t),y(t−τ)). | (3.1) |
In model (3.1), x (billion tons) means total carbon absorption at time t, y (billion tons) means total carbon emissions at time t, r1 means the annual growth rate of carbon absorption, r2 means the annual growth rate of carbon emissions, N1 (billion tons) means the maximum value of carbon absorption in a certain space, N2 (billion tons) means the maximum environmental capacity of carbon emissions, α means absorption coefficient of carbon emissions corresponding to carbon absorption, and v(y(t),y(t−τ)) means the impact of the urbanization development process on the rate of carbon emissions. Thus, we can describe a dynamic system in which carbon emission and carbon absorption change together in a certain time and space. We record the process that they change together as carbon emission-absorption.
Next, we discuss the specific expression of v(y(t),y(t−τ)). According to the Northam curve in Figure 2, the overall trend of urbanization is "slow-fast-slow", and the shape of the curve is "S" [33]. According to the data of the National Bureau of Statistics (http://www.stats.gov.cn/, 2021 China Statistical Yearbook, accessed on 11 November 2022), the overall urbanization rate of China is 63%, which is in the upper middle of the curve. Therefore, the development trend curve of urbanization in the future (the second half of the "S" curve) can be regarded as the left half of the quadratic function with downward opening. In other words, the derivative form is a linear function with a negative slope.
With the increase of the amount of carbon emissions brought by cities, the speed of urbanization will slow down. Let a be the influence coefficient of the speed of urbanization on the growth rate of carbon emissions, we can assume that the growth rate of carbon emissions caused by urbanization is a linearly decreasing function. The form is shown in the equation v0(y(t),y(t−τ))=a−sy(t), where y(t) is the amount of carbon emissions and s is the change rate. With the increase of urbanization, carbon emissions will eventually tend to a stable constant M. At this time, the growth rate of carbon emissions is 0. So we can get the equation a−sM=0. Put a−sM=0 into equation v0(y(t),y(t−τ)), and we get the expression for a, M and y(t). However, the speed of urban internal construction often lags behind the urbanization process. The current urban carbon emissions are promoted by the urban carbon emissions at a certain time in the past. We use time delay to represent this effect. Replace y(t) with y(t−τ), we get the specific expression of v(y(t),y(t−τ)) is
v(y(t),y(t−τ))=a(1−y(t−τ)M). | (3.2) |
Among them, y (billion ton) means total carbon emissions at time t, a means the influence coefficient of the speed of urbanization on the growth rate of carbon emissions, and M (billion ton) means the maximum value of urban carbon emissions.
Based on the above analysis and model (3.1), we get the following carbon emission-absorption model under the influence of urbanization,
{dxdt=r1x(1−xN1+αyN2),dydt=r2y(1−yN2)+a(1−y(t−τ)M). | (3.3) |
The meaning of the parameters in the model (3.3) is shown in Table 1. In the next parts, we mainly discuss the model (3.3).
Parameter | Description | unit |
x | Total carbon absorption at time t | billion tons |
y | Total carbon emissions at time t | billion tons |
r1 | The annual growth rate of carbon absorption | - |
N1 | The maximum value of carbon absorption in a certain space | billion tons |
α | The absorption coefficient of carbon emissions corresponding to carbon absorption | - |
r2 | The annual growth rate of carbon emissions | - |
N2 | The maximum environmental capacity of carbon emissions | billion tons |
a | The influence coefficient of the speed of urbanization on the growth of carbon emissions | - |
M | The maximum value of urban carbon emissions | billion tons |
τ | Time of urban ecological process adapting to population migration | years |
In this section, we analyze the existence and stability of the equilibrium of the model (3.3). We give the following assumption,
(H)aM−r2−√(r2−aM)2+4ar2N2<0. |
When assumption (H) holds, model (3.3) has only one positive equilibrium E∗=(x∗,y∗), where
x∗=N1+αN1N2y∗,y∗=N22(−aMr2+√N2(Mr2−a)2+4ar2M2r2M√N2+1). |
When τ=0, model (3.3) becomes
{dxdt=r1x(1−xN1+αyN2),dydt=r2y(1−yN2)+a(1−yM). | (4.1) |
By linearizing system (4.1) at E∗, we get the characteristic equation at E∗ as follows:
λ2+(h1+aM)λ+h2+h3=0, | (4.2) |
where
h1=−r1−r2+2r1N1x∗+2r2−αr1N2y∗,h2=(−r1+2r1N1x∗−αr1N2y∗)(−r2+2r2N2y∗),h3=(−r1+2r1N1x∗−αr1N2y∗)aM. |
Equation (4.2) has two roots, donated as λ1 and λ2. We can calculate:
λ1+λ2=h1+aM<0,λ1⋅λ2=h2+h3>0. |
Thus Eq (4.2) has two characteristic roots with negative real parts. According to the theory of nonlinear dynamic systems [34], we get the following lemma:
Lemma 4.1. When assumption (H) holds, equilibrium E∗=(x∗,y∗) of system (4.1) is locally asymptotically stable.
By analyzing system (4.1), we get the following theorem:
Theorem 4.1. When the initial value is nonnegative, all solutions of system (4.1) are nonnegative.
Proof. Firstly, we prove that x(t) is nonnegative for all t≥0 under nonnegative initial values. We use proof by contradiction. We assume that ∃t1>0 such that x(t1)=0 and x′(t1)<0, then by the first equation of system (4.1) we have dx(t1)dt=r1x(t1)(1−x(t1)N1+αyN2)=0, which contradicts x′(t1)<0. Similarly, note that a>0, we can also prove that y(t) is also nonnegative for all t≥0 under nonnegative initial values.
The characteristic equation of model (3.3) at E∗ is as follows:
λ2+h1λ+h2+(h3+λaM)e−λτ=0, | (4.3) |
where
h1=−r1−r2+2r1N1x∗+2r2−αr1N2y∗,h2=(−r1+2r1N1x∗−αr1N2y∗)(−r2+2r2N2y∗),h3=(−r1+2r1N1x∗−αr1N2y∗)aM. |
When τ>0,
h2+h3=−(r1+αr1N2y∗)(2r2+√N2(Mr2−a)2+4ar2M√N2)≠0. |
Thus λ=0 is not the root of Eq (4.3). For model (3.3), there is no fixed point bifurcation at E∗.
Next, we try to discuss the existence of Hopf bifurcation. We assume that λ=±iω is a pure imaginary root of Eq (4.3). Substituting λ=±iω into Eq (4.3) and separating the real and imaginary parts, we can get the expression as follows:
{ω2−r1N1x∗(−r2+2r2N2y∗)=aMr1N1x∗cos(ωτ)+aMωsin(ωτ),(−r2+r1N1x∗+2r2N2y∗+aM)ω=aMr1N1x∗sin(ωτ)−aMωcos(ωτ). | (4.4) |
Add the squares of the two formulas of Eq (4.4) and let z=ω2, we get the following equation:
h(z)=z2+[(m+n+aM)2−2mn−(aM)2]z+(mn)2−(aMn)2=0, | (4.5) |
where
m=−r2+2r2N2y∗,n=r1N1x∗. |
Equation (4.5) has two roots, denoted as z1 and z2, and we can calculate:
z1+z2=−(m2+n2+2maM+2naM)<0,z1⋅z2=[m2−(aM)2]n2>0. |
Equation (4.5) has two roots with negative real parts. Thus we can get the following theorem:
Theorem 4.2. When (H) holds, the equilibrium E∗ of the model (3.3) is locally asymptotically stable for any τ>0. The model (3.3) has no fixed point bifurcation or Hopf bifurcation at E∗.
In this section, we collect data about China's carbon emissions, carbon absorption, and China's urbanization rate in recent years. Then we determine the range of parameters according to the trend of data change.
Based on the Chinese version of bp Statistical Review of World Energy (https://www.bp.com/, Statistical Review of World Energy 2022−all data 1965-2021, accessed on 11 November 2022), we can collect data on the amount of China's carbon emissions from 2010 to 2021 shown in Table 2. According to the growth of carbon emissions in recent years, we can infer that the growth rate of carbon emissions r2∈(−0.01,0.02).
Year | 2010 | 2011 | 2012 | 2013 | 2014 | 2015 |
Values/billion ton | 8.122 | 8.794 | 8.979 | 9.219 | 9.257 | 9.226 |
Annual growth rate | - | 0.0764 | 0.0206 | 0.0261 | 0.0041 | -0.0033 |
Year | 2016 | 2017 | 2018 | 2019 | 2020 | 2021 |
Values/billion ton | 9.234 | 9.445 | 9.676 | 9.869 | 9.974 | 10.523 |
Annual growth rate | 0.0009 | 0.0223 | 0.0239 | 0.0195 | 0.0106 | 0.0521 |
We fit the growth rate of carbon emissions as a cubic function, as shown in Figure 3. The zero point of abscissa corresponds to the year 2010. The fitting equation is y1=−0.0003x3+0.0067x2−0.0486x+0.1099. According to the growing trend of the fitting function, N2 can be taken as 11.760 billion tons. In addition, y1max=0.1099. According to the maximum growth rate y1max, N2 can be taken as 15.975 billion tons. Therefore, we consider that the range of maximum environmental capacity of carbon emissions N2∈(12,16).
According to the research of the European Environmental Agency (EEA), about 69% of the carbon emitted by the world's fossil energy consumption is consumed by surface vegetation. The capacity of vegetation to absorb carbon per hectare is about 0.95t [35]. We can get the formula x=0.95S, where x is the amount of carbon absorption and S is the vegetation coverage. Thus we select α=0.95. Liu et al. [36] found that the vegetation cover increased significantly from 1982 to 1997 and from 1997 to 2012, which were 1.2%/10a and 0.6%/10a respectively. At the same time, China is also developing advanced technologies to promote carbon absorption, such as CCUS [37]. Therefore, we can roughly estimate that the growth rate of carbon absorption r1∈(0.02,0.05), and the maximum value that carbon absorption N1∈(7,12).
Based on a report named The Homecoming of Small Town Youth: From Town to City – "Urbanization" Series No.2 issued by Haitong Securities in November 2019 (analyst: C. Jiang, X. Chen) (https://www.htsec.com/ChannelHome/2016102402/5867538.shtml, accessed on 11 November 2022), we can collect data on the urbanization rate of China from 2000 to 2020, as shown in Figure 4. The straight line of fitting result represents the development trend of the urbanization process. So we can predict that a∈(1,3).
Based on China's per capita carbon emissions from World Bank Open Data (https://data.worldbank.org/, CO2 emissions (metric tons per capita), accessed on 11 November 2022), we can collect the per capita carbon emissions data of China from 2010 to 2021 shown in Table 3.
Year | 2010 | 2011 | 2012 | 2013 | 2014 | 2015 |
Values/ton | 6.34 | 6.90 | 7.05 | 7.32 | 7.29 | 7.15 |
Annual growth rate | - | 0.082 | 0.021 | 0.038 | -0.004 | -0.021 |
Year | 2016 | 2017 | 2018 | 2019 | 2020 | 2021 |
Values/ton | 7.12 | 7.23 | 7.49 | 7.61 | 8.08 | 8.44 |
Annual growth rate | -0.004 | 0.016 | 0.034 | 0.016 | 0.059 | 0.043 |
We fit the growth rate as a cubic function to predict the range of M, as shown in Figure 5. The zero point of abscissa corresponds to the year 2010. The fitting equation is y2=−0.0002x3−0.0066x2−0.0564x+0.1484. Thus we can calculate per capita carbon emissions of China will peak in 2028, with a value of 11.823t. According to the development trend of urbanization and total population, we can predict that the total urban carbon emissions M∈(11,12).
Based on all the above analyses, we can estimate the range of each parameter, as shown in the following Table 4.
Parameters | r1 | r2 | N1 | N2 | M | α | a |
Ranges | (0.02,0.05) | (−0.01,0.02) | (7,12) | (12,16) | (11,12) | 0.95 | (1,3) |
1) We discuss whether the dual carbon target of China can be successfully achieved under the current conditions. We choose a group of parameters to make each parameter as close as possible to the current situation in China. In 2020, the amount of carbon emission is 9.9 billion tons and the amount of carbon absorption is 1.1 billion tons. Thus we choose (x(t),y(t))=(1.1,9.9) for t∈(−τ,0) as the initial function of the simulation.
GroupⅠ:r1=0.03,r2=0.01,N1=10,N2=16,M=11.5,α=0.95,a=2.5. |
The values of parameters satisfy the assumption (H). According to Theorem 2, for any τ>0, the equilibrium E∗=(16.915,11.646) is locally asymptotically stable. The time delay represents the time of urban ecological process adapting to population migration. Based on the practical meaning of τ, we consider that the reasonable time delay is about 1–3 years. Thus, we choose a middle-value τ=2. We give the simulation result of the locally asymptotically stable at E∗ when τ=2, as shown in Figure 6. The zero point of abscissa corresponds to the year 2020.
Remark 1: From the simulation, we find that in order to reach carbon peak by 2030, the average growth rate of carbon emissions needs to be kept within 0.01. The simulation result shows that China can achieve carbon peak by 2030. The value of carbon emissions at the peak is 11.65 billion tons, which is greater than the carbon absorption of 2.32 billion tons. Therefore, we can infer that according to the current situation of carbon emission and carbon absorption, if China wants to reach carbon neutrality by 2060, some measures must be taken to increase the growth rate of carbon absorption. In other words, in 2060, the amount of carbon emission is still greater than carbon absorption.
According to the simulation results in Figure 6, we perform further simulations. We choose different initial functions under the parameters Group Ⅰ as follows:
(x(t),y(t))=(0.5,0.4),(x(t),y(t))=(10,8),(x(t),y(t))=(40,40),(x(t),y(t))=(100,90), |
for t∈(−τ,0), respectively. Then, we get the following simulation results in Figure 7.
Remark 2: We choose four different initial functions arbitrarily, and all the solutions of the model (3.3) eventually tend to the equilibrium E∗=(16.915,11.646). The simulation results show that model (3.3) may have a globally asymptotically stable equilibrium E∗.
2) We assume that the carbon peak of China has been achieved, and then discuss the conditions for achieving carbon neutrality in 2060. We need to choose the group of parameters that can reduce carbon emissions and increase carbon absorption. According to the current growth rate and the results of simulation 1), we estimate that the carbon absorption in 2030 is 2.32 billion tons and the carbon emissions is 11.65 billion tons. So we choose (x(t),y(t))=(2.32,11.65) for t∈(−τ,0) as the initial function of the simulation.
GroupⅡ:r1=0.05,r2=0.00001,N1=10,N2=16,M=11.5,α=0.95,a=1.5. |
The values of parameters satisfy the assumption (H). At this time, we still choose τ=2. The equilibrium E∗=(16.815,11.478) is locally asymptotically stable according to Theorem 2. We give the simulation result of the locally asymptotically stable at E∗ in Figure 8. The zero point of abscissa corresponds to the year 2030.
Remark 3: We find that to achieve carbon neutrality in 2060, we need to control the average growth rate of carbon absorption to reach 0.05 or more after achieving the carbon peak. The simulation result shows that when the growth rate of carbon absorption increases and the growth rate of carbon emission decreases to almost zero, the carbon emissions and carbon absorption in 2060 are both about 11.5 billion tons. In other words, under this condition, the dynamic balance between carbon emissions and carbon absorption is achieved. And after 2060, carbon absorption will continue to increase, while carbon emissions will remain unchanged. It leads to a surplus of the amount of carbon absorption.
To further prove our guess, we select several different initial functions under the parameters Group Ⅱ for numerical simulation:
(x(t),y(t))=(0.5,0.4),(x(t),y(t))=(10,8),(x(t),y(t))=(40,40),(x(t),y(t))=(100,90), |
for t∈(−τ,0), respectively. Then, we get the following simulation results in Figure 9.
Remark 4: All of the solutions of the model (3.3) eventually tend to the equilibrium E∗=(16.815,11.478). The simulation results agree with our guess, that is model (3.3) may have a globally asymptotically stable equilibrium E∗.
3) We will discuss the impact of dual carbon target in a situation where the internal construction of the city lags far behind the external migration. Therefore, we assume that the time delay becomes longer and perform the simulation. We still choose the current situation of carbon emission and carbon absorption and then increase the value of time delay to τ=6 years. We choose the amount of carbon emission and the amount of carbon absorption of the year 2020 that (x(t),y(t))=(1.1,9.9) for t∈(−τ,0) as the initial function of the simulation.
GroupⅢ:r1=0.03,r2=0.01,N1=10,N2=16,M=11.5,α=0.95,a=2.5. |
The parameter values are the same as in the first group of simulations. According to Theorem 2, the equilibrium E∗=(16.815,11.478) is also locally asymptotically stable for any τ>0. We give the simulation result of the local asymptotic stability at E∗ when τ=6, as shown in Figure 10. The zero point of abscissa corresponds to the year 2020.
Remark 5: We find that when the time delay is too large, carbon emissions will experience a period of large fluctuations, and then tend to stabilize slowly. In other words, when the process of urban internal construction lags behind the process of population migration too much, the achievement of China's dual carbon target will be disrupted. The cities should try to narrow the gap between internal ecological construction and the external population migration process. We give the following suggestions: (1) Improve the quality of the population. Public awareness and people's concern about carbon neutrality influence the realization of carbon neutrality [38]. So this measure can partly reduce the damage to urban ecology caused by population migration. (2) Improve the urban ecological construction level by promoting scientific and technological innovation, upgrading energy allocation, improving the greening level, and other measures. The progress of urban green development is mainly accelerated by technological development, effective energy allocation, and industrial structure upgrading [39]. Therefore, these measures could be the main factors to narrow this gap. (3) Formulate policies to regulate urban ecological development. At present, the intensity of population migration in China has decreased, but it still shows a trend of migration to cities. The development of policies that fit the Chinese context is also an important factor.
In this paper, we used mathematical modeling and numerical simulations to analyze the impact of China's urbanization process on carbon peak and carbon neutrality. According to the current development of carbon emission, carbon absorption, and urbanization, we simulated the possible situation, draw some relevant conclusions, and gave some policy recommendations.
1) Through the analytic hierarchy process, we concluded that the level of urbanization is an important influencing factor of the dual carbon target. In fact, there are many factors affecting carbon emission and absorption, such as the economy, energy, and so on. In this paper, we only selected one aspect and hope to analyze other factors in future studies.
2) We found that the equilibrium of model (3.3) with τ=0 has nonnegative solutions when the initial value is nonnegative. The equilibrium E∗ of the model (3.3) is locally asymptotically stable for any τ≥0, and the model (3.3) has no fixed point bifurcation or Hopf bifurcation at E∗. Through numerical simulation, we also guessed that the model (3.3) may have a globally asymptotically stable equilibrium.
3) We found that according to the current growth rate, the carbon peak can be achieved by 2030. However, the amount of carbon absorption at the peak is still much smaller than the amount of carbon emission. Therefore, some measures should take to control the growth rate of carbon emissions to zero or even negative after the peak, such as promoting energy reform, improving energy efficiency, vigorously advocating low-carbon life, etc. In the meanwhile, the growth rate of carbon absorption needs to be increased by expanding vegetation coverage and developing carbon capture technology, such as CCS, CCUS, etc.
4) We simulated the development of carbon emissions and carbon absorption after the carbon peak. We found that when the average growth rate of carbon absorption between 2030 and 2060 reaches 0.05 or more, carbon neutrality can be achieved by 2060. In addition, after 2060, the amount of carbon absorption will continue to increase until it reaches the equilibrium. In this case, there is a surplus of carbon absorption. According to the United Nations Framework Convention on Climate Change and the Kyoto Protocol [40,41], we suggested selling excess carbon absorption through the carbon trading market. In this way, we can create a win-win situation for the economy and ecology.
5) We increased the value of the time delay for numerical simulations. We found that urban ecological construction cannot lag too far behind the process of population migration. When the population of a city far exceeds the ecological carrying capacity of the city, the carbon balance may be destroyed. Therefore, with the steady improvement of the urbanization rate, cities should actively improve the greening level, control the per capita carbon emissions, formulate reasonable policies, etc, in order to narrow the gap between the cities' internal ecological construction and the external population migration process.
This study was funded by Fundamental Research Funds for the Central Universities of China (Grant No. 2572022DJ06) and College Students Innovations Special Project funded by Northeast Forestry University of China (No. 202210225155).
The authors declare that they have no competing interests.
[1] | F. Hernández-Campos, K. Jeffay, F. D. Smith, Tracking the evolution of web traffic: 1995–2003, in 11th IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer Telecommunications Systems, (2003), 16–25. https://doi.org/10.1109/MASCOT.2003.1240638 |
[2] | H. Schulze, K. Mochalski, Internet study 2008/2009, Ipoque Rep., 37 (2009), 351–362. |
[3] | T. Zimmermann, J. Rüth, B. Wolters, O. Hohlfeld, How HTTP/2 pushes the web: An empirical study of HTTP/2 server push, in 2017 IFIP Networking Conference (IFIP Networking) and Workshops, (2017), 1–9. https://doi.org/10.23919/IFIPNetworking.2017.8264830 |
[4] | O. Hohlfeld, J. Rüth, K. Wolsing, T. Zimmermann, Characterizing a meta-CDN, in International Conference on Passive and Active Network Measurement, (2018), 114–128. https://doi.org/10.1007/978-3-319-76481-8_9 |
[5] | F. Lichtblau, F. Streibelt, T. Krüger, P. Richter, A. Feldmann, Detection, classification, and analysis of inter-domain traffic with spoofed source IP addresses, in Proceedings of the 2017 Internet Measurement Conference, (2017), 86–99. https://doi.org/10.1145/3131365.3131367 |
[6] | A. Al-Najjar, S. Teed, J. Indulska, M. Portmann, Flow-based load balancing of web traffic using OpenFlow, in 2017 27th International Telecommunication Networks and Applications Conference (ITNAC), (2017), 1–6. https://doi.org/10.1109/ATNAC.2017.8215411 |
[7] | Cisco, Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2016–2021, 2017. Available from: https://www.ramonmillan.com. |
[8] | W. Li, A. W. Moore, M. Canini, Classifying HTTP traffic in the new age, ACM SIGCOMM, 8 (2008), 17–22. |
[9] |
J. Liu, C. Fang, N. Ansari, Request dependency graph: A model for web usage mining in large-scale web of things, IEEE Internet Things J., 3 (2016), 598–608. https://doi.org/10.1109/JIOT.2015.2452964 doi: 10.1109/JIOT.2015.2452964
![]() |
[10] | L. Vassio, I. Drago, M. Mellia, Detecting user actions from HTTP traces: toward an automatic approach, in 2016 International Wireless Communications and Mobile Computing Conference (IWCMC), (2016), 50–55. https://doi.org/10.1109/IWCMC.2016.7577032 |
[11] | G. Scavo, Z. B. Houidi, S. Traverso, R. Teixeira, M. Mellia, WeBrowse: mining HTTP logs online for network-based content recommendation, preprint, arXiv: 1602.06678. |
[12] | P. Fiadino, A. Bar, P. Casas, HTTPTag: a flexible on-line HTTP classification system for operational 3G networks, in 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), (2013), 71–72. https://doi.org/10.1109/INFCOMW.2013.6970744 |
[13] |
X. Gui, J. Liu, Q. Lv, C. Dong, Z. Lei, Probabilistic top-k query: model and application on web traffic analysis, China Commun., 13 (2016), 123–137. https://doi.org/10.1109/CC.2016.7513208 doi: 10.1109/CC.2016.7513208
![]() |
[14] |
J. Sun, L. She, H. Chen, W. Zhong, C. Chang, Z. Chen, et al., Automatically identifying apps in mobile traffic, Concurrency Comput. Pract. Exper., 28 (2016), 3927–3941. https://doi.org/10.1002/cpe.3703 doi: 10.1002/cpe.3703
![]() |
[15] |
G. Aceto, D. Ciuonzo, A. Montieri, A. Pescapé, Mobile encrypted traffic classification using deep learning: experimental evaluation, lessons learned, and challenges, IEEE Trans. Network Serv. Manage., 16 (2019), 445–458. https://doi.org/10.1109/TNSM.2019.2899085 doi: 10.1109/TNSM.2019.2899085
![]() |
[16] |
P. Białczak, W. Mazurczyk, Characterizing anomalies in malware-generated HTTP traffic, Secur. Commun. Networks, 2020 (2020). https://doi.org/10.1155/2020/8848863 doi: 10.1155/2020/8848863
![]() |
[17] |
J. Li, H. Zhang, Z. Wei, The weighted word2vec paragraph vectors for anomaly detection over HTTP traffic, IEEE Access, 8 (2020), 141787–141798. https://doi.org/10.1109/ACCESS.2020.3013849 doi: 10.1109/ACCESS.2020.3013849
![]() |
[18] |
G. D'Angelo, F. Palmieri, Network traffic classification using deep convolutional recurrent autoencoder neural networks for spatial–temporal features extraction, J. Network Comput. Appl., 173 (2021), 102890. https://doi.org/10.1016/j.jnca.2020.102890 doi: 10.1016/j.jnca.2020.102890
![]() |
[19] |
S. Dong, Y. Xia, T. Peng, Traffic identification model based on generative adversarial deep convolutional network, Ann. Telecommun., (2021), 1–15. https://doi.org/10.1007/s12243-021-00876-6 doi: 10.1007/s12243-021-00876-6
![]() |
[20] |
T. T. Nguyen, G. Armitage, A survey of techniques for internet traffic classification using machine learning, IEEE Commun. Surv. Tutorials, 10 (2008), 56–76. https://doi.org/10.1109/SURV.2008.080406 doi: 10.1109/SURV.2008.080406
![]() |
[21] |
A. Callado, C. Kamienski, G. Szabó, B. P. Gero, J. Kelner, S. Fernandes, et al., A survey on internet traffic identification, IEEE Commun. Surv. Tutorials, 11 (2009), 37–52. https://doi.org/10.1109/SURV.2009.090304 doi: 10.1109/SURV.2009.090304
![]() |
[22] |
A. Dainotti, A. Pescape, K. C. Claffy, Issues and future directions in traffic classification, IEEE Network, 26 (2012), 35–40. https://doi.org/10.1109/MNET.2012.6135854 doi: 10.1109/MNET.2012.6135854
![]() |
[23] |
M. Finsterbusch, C. Richter, E. Rocha, J. Muller, K. Hanssgen, A survey of payload-based traffic classification approaches, IEEE Commun. Surv. Tutorials, 16 (2013), 1135–1156. https://doi.org/10.1109/SURV.2013.100613.00161 doi: 10.1109/SURV.2013.100613.00161
![]() |
[24] |
D. Naboulsi, M. Fiore, S. Ribot, R. Stanica, Large-scale mobile traffic analysis: a survey, IEEE Commun. Surv. Tutorials, 18 (2015), 124–161. https://doi.org/10.1109/COMST.2015.2491361 doi: 10.1109/COMST.2015.2491361
![]() |
[25] |
P. Velan, M. Cermak, P. Celeda, M. Drasar, A survey of methods for encrypted traffic classification and analysis, Int. J. Network Manage., 25 (2015), 355–374. https://doi.org/10.1002/nem.1901 doi: 10.1002/nem.1901
![]() |
[26] |
D. Acarali, M. Rajarajan, N. Komninos, I. Herwono, Survey of approaches and features for the identification of HTTP-based botnet traffic, J. Network Comput. Appl., 76 (2016), 1–15. https://doi.org/10.1016/j.jnca.2016.10.007 doi: 10.1016/j.jnca.2016.10.007
![]() |
[27] |
W. Pan, G. Cheng, X. Guo, S. Huang, Review and perspective on encrypted traffic identification research, J. Commun., 37 (2016), 154–167. https://doi.org/10.11959/j.issn.1000-436x.2016187 doi: 10.11959/j.issn.1000-436x.2016187
![]() |
[28] |
F. Pacheco, E. Exposito, M. Gineste, C. Baudoin, J. Aguilar, Towards the deployment of machine learning solutions in network traffic classification: A systematic survey, IEEE Commun. Surv. Tutorials, 21 (2018), 1988–2014. https://doi.org/10.1109/COMST.2018.2883147 doi: 10.1109/COMST.2018.2883147
![]() |
[29] |
S. Rezaei, X. Liu, Deep learning for encrypted traffic classification: an overview, IEEE Commun. Mag., 57 (2019), 76–81. https://doi.org/10.1109/MCOM.2019.1800819 doi: 10.1109/MCOM.2019.1800819
![]() |
[30] |
A. D'Alconzo, I. Drago, A. Morichetta, M. Mellia, P. Casas, A survey on big data for network traffic monitoring and analysis, IEEE Trans. Network Serv. Manage., 16 (2019), 800–813. https://doi.org/10.1109/TNSM.2019.2933358 doi: 10.1109/TNSM.2019.2933358
![]() |
[31] | W. M. Shbair, T. Cholez, J. François, I. Chrisment, A survey of HTTPS traffic and services identification approaches, preprint, arXiv: 2008.08339. |
[32] |
G. Aceto, D. Ciuonzo, A. Montieri, A. Pescape, Toward effective mobile encrypted traffic classification through deep learning, Neurocomputing, 409 (2020), 306–315. https://doi.org/10.1016/j.neucom.2020.05.036 doi: 10.1016/j.neucom.2020.05.036
![]() |
[33] | A. Shahraki, M. Abbasi, A. Taherkordi, A. D. Jurcut, . Active learning for network traffic classification: a technical study, preprint, arXiv: 2106.06933. |
[34] |
S. Dong, R. Li, Traffic identification method based on multiple probabilistic neural network model, Neural Comput. Appl., 31 (2019), 473–487. https://doi.org/10.1007/s00521-017-3081-x doi: 10.1007/s00521-017-3081-x
![]() |
[35] | H. Tang, Z. Li, Design and implementation of a DPI-Based P2P traffic control system, Inf. Secur. Commun. Privacy, 6 (2007). |
[36] |
M. Soysal, E. G. Schmidt, Machine learning algorithms for accurate flow-based network traffic classification: evaluation and comparison, Perform. Eval., 67 (2010), 451–467. https://doi.org/10.1016/j.peva.2010.01.001 doi: 10.1016/j.peva.2010.01.001
![]() |
[37] |
S. Dong, Multi class SVM algorithm with active learning for network traffic classification, Expert Syst. Appl., 176 (2021), 114885. https://doi.org/10.1016/j.eswa.2021.114885 doi: 10.1016/j.eswa.2021.114885
![]() |
[38] |
F. Haddadi, A. N. Zincir-Heywood, Benchmarking the effect of flow exporters and protocol filters on botnet traffic classification, IEEE Syst. J., 10 (2016), 1390–1401. https://doi.org/10.1109/JSYST.2014.2364743 doi: 10.1109/JSYST.2014.2364743
![]() |
[39] |
T. Bakhshi, B. Ghita, On internet traffic classification: A two-phased machine learning approach, J. Comput. Networks Commun., 2016 (2016). https://doi.org/10.1155/2016/2048302 doi: 10.1155/2016/2048302
![]() |
[40] |
S. Dong, X. Zhang, D. Zhou, Auto adaptive identification algorithm based on network traffic flow, Int. J. Comput. Commun. Control, 9 (2014), 672–685. http://dx.doi.org/10.1145/1080091.1080119 doi: 10.1145/1080091.1080119
![]() |
[41] |
Y. Dong, J. Zhao, J. Jin, Novel feature selection and classification of Internet video traffic based on a hierarchical scheme, Comput. Networks, 119 (2017), 102–111. https://doi.org/10.1016/j.comnet.2017.03.019 doi: 10.1016/j.comnet.2017.03.019
![]() |
[42] | S. Dong, W. Liu, D. Zhou, Y. Qi, NSVM: A new SVM algorithm based on traffic flow metric, J. Internet Technol., 16 (2015), 1005–1014. |
[43] |
R. Dubin, A. Dvir, O. Pele, O. Hadar, I know what you saw last minute—encrypted http adaptive video streaming title classification, IEEE Trans. Inf. Forensics Secur., 12 (2017), 3039–3049. https://doi.org/10.1109/TIFS.2017.2730819 doi: 10.1109/TIFS.2017.2730819
![]() |
[44] |
H. D. Trinh, A. F. Gambin, L. Giupponi, M. Rossi, P. Dini, Mobile traffic classification through physical control channel fingerprinting: a deep learning approach, IEEE Trans. Network Serv. Manage., 2020 (2020). https://doi.org/10.1109/TNSM.2020.3028197 doi: 10.1109/TNSM.2020.3028197
![]() |
[45] | M. Xie, J. Fu, Y. Wang, G. Peng, Monitoring and blocking methods of HTTP traffic injection in mobile web browser, J. Wuhan Univ., 63 (2017), 385–396. |
[46] | G. Rizothanasis, N. Carlsson, A. Mahanti, Identifying user actions from HTTP (S) traffic, in 2016 IEEE 41st Conference on Local Computer Networks (LCN), (2016), 555–558. https://doi.org/10.1109/LCN.2016.91 |
[47] | J. Manzoor, I. Drago, R. Sadre, How HTTP/2 is changing web traffic and how to detect it, in 2017 Network Traffic Measurement and Analysis Conference (TMA), (2017), 1–9. https://doi.org/10.23919/TMA.2017.8002899 |
[48] | J. Muehlstein, Y. Zion, M. Bahumi, I. Kirshenboim, R. Dubin, A. Dvir, et al., Analyzing HTTPS encrypted traffic to identify user's operating system, browser and application, in 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC), (2017), 1–6. https://doi.org/10.1109/CCNC.2017.8013420 |
[49] |
T. Petsas, A. Papadogiannakis, M. Polychronakis, E. P. Markatos, T. Karagiannis, Measurement, modeling, and analysis of the mobile app ecosystem, ACM Trans. Model. Perform. Eval. Comput. Syst., 2 (2017), 7. https://doi.org/10.1145/2993419 doi: 10.1145/2993419
![]() |
[50] | M. Rapoport, P. Suter, E. Wittern, O. Lhotak, J. Dolby, Who you gonna call? Analyzing web requests in Android applications, in 2017 IEEE/ACM 14th International Conference on Mining Software Repositories (MSR), (2017), 80–90. https://doi.org/10.1109/MSR.2017.11 |
[51] | Z. B. Houidi, G. Scavo, S. Ghamri-Doudane, A. Finamore, S. Traverso, M. Mellia, Gold mining in a river of internet content traffic, in International Workshop on Traffic Monitoring and Analysis, Springer, (2014), 91–103. https://doi.org/10.1007/978-3-642-54999-1_8 |
[52] | UNIBS, 2011. Available from: http://netweb.ing.unibs.it/ ntw/tools/traces/. |
[53] | CIC, 2021. Available from: https://www.unb.ca/cic/datasets/. |
[54] | UMass, 2021. Available from: http://skuld.cs.umass.edu/traces/network/README-webident2. |
[55] | CAIDA, 2021. Available from: https://catalog.caida.org/search?query=types=dataset. |
[56] | WIDE, 2021. Available from: http://mawi.wide.ad.jp/mawi/. |
[57] | G. Maier, A. Feldmann, V. Paxson, A. Mark, On dominant characteristics of residential broadband internet traffic, in Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement Conference, (2009), 90–102. https://doi.org/10.1145/1644893.1644904 |
[58] |
L. Bernaille, R. Teixeira, I. Akodkenou, A. Soule, K. Salamatian, Traffic classification on the fly, ACM SIGCOMM Comput. Commun. Rev., 36 (2006), 23–26. https://doi.org/10.1145/1129582.1129589 doi: 10.1145/1129582.1129589
![]() |
[59] | L. Bernaille, R. Teixeira, K. Salamatian, Early application identification, in Proceedings of the 2006 ACM CoNEXT Conference, (2006), 1–12. https://doi.org/10.1145/1368436.1368445 |
[60] | L. Bernaille, R. Teixeira, Early recognition of encrypted applications, in International Conference on Passive and Active Network Measurement, (2007), 165–175. https://doi.org/10.1007/978-3-540-71617-4_17 |
[61] |
A. Este, F. Gringoli, L. Salgarelli, On the stability of the information carried by traffic flow features at the packet level, ACM SIGCOMM Comput. Commun. Rev., 39 (2009), 13–18. https://doi.org/10.1145/1568613.1568616 doi: 10.1145/1568613.1568616
![]() |
[62] | N. Huang, G. Jai, H. Chao, Early identifying application traffic with application characteristics, in 2008 IEEE International Conference on Communications, (2008), 5788–5792. https://doi.org/10.1109/ICC.2008.1083 |
[63] |
N. Huang, G. Jai, H. Chao, Y. Tzang, H. Chang, Application traffic classification at the early stage by characterizing application rounds, Inf. Sci., 232 (2013), 130–142. https://doi.org/10.1016/j.ins.2012.12.039 doi: 10.1016/j.ins.2012.12.039
![]() |
[64] |
T. T. Nguyen, G. Armitage, P. Branch, S. Zander, Timely and continuous machine-learning-based classification for interactive IP traffic, IEEE/ACM Trans. Networking, 20 (2012), 1880–1894. https://doi.org/10.1109/TNET.2012.2187305 doi: 10.1109/TNET.2012.2187305
![]() |
[65] | G. He, M. Yang, J. Luo, L. Zhang, Online identification of tor anonymous communication traffic, J. Commun., 24 (2013), 540–556. |
[66] | L. Chen, J. Gong, Fast application-level traffic classification using NetFlow records, J. Commun., 33 (2012), 145–152. https://doi.org/1000-436X(2012)01-0145-08 |
[67] |
S. Dong, W. Ding, Traffic classification model based on fusion of multiple classifiers with flow preference, J. Commun., 34 (2013), 143–152. https://doi.org/10.3969/j.issn.1000-436x.2013.10.017 doi: 10.3969/j.issn.1000-436x.2013.10.017
![]() |
[68] |
V. Paxson, Empirically derived analytic models of wide-area TCP connections, IEEE/ACM Trans. Networking, 2 (1994), 316–336. https://doi.org/10.1109/90.330413 doi: 10.1109/90.330413
![]() |
[69] | C. Dewes, A. Wichmann, A. Feldmann, An analysis of Internet chat systems, in Proceedings of the 3rd ACM SIGCOMM Conference on Internet Measurement, (2003), 51–64. https://doi.org/10.1145/948205.948214 |
[70] | T. Lang, G. Armitage, P. Branch, H. Choo, A synthetic traffic model for half-life, in Aust. Telecommun. Networks Appl. Conference, 2003 (2003), 1–5. |
[71] | T. Lang, P. Branch, G. Armitage, A synthetic traffic model for Quake3, in Proceedings of the 2004 ACM SIGCHI International Conference on Advances in Computer Entertainment Technology, (2004), 233–238. https://doi.org/10.1145/1067343.1067373 |
[72] | S. Cheung, R. Crawford, M. Dilger, J. Frank, J. Hoagland, K. Levitt, et al. The design of GrIDS: A graph-based intrusion detection system, in Technical Report CSE-99-2, UC Davis Computer Science Department, (1999). |
[73] | M. Iliofotou, P. Pappu, M. Faloutsos, M. Mitzenmacher, S. Singh, G. Varghese, Network monitoring using traffic dispersion graphs (tdgs), in Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement, (2007), 315–320. https://doi.org/10.1145/1298306.1298349 |
[74] |
M. Iliofotou, H. Kim, M. Faloutsos, M. Mitzenmacher, P. Pappu, G. Varghese, Graption: a graph-based P2P traffic classification framework for the internet backbone, Comput. Networks, 55 (2011), 1909–1920. https://doi.org/10.1016/j.comnet.2011.01.020 doi: 10.1016/j.comnet.2011.01.020
![]() |
[75] | Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2017–2022 White Paper, 2019. Available from: https://branden.biz/wp-content/uploads/2019/05/white-paper-c11-738429.pdf. |
[76] | A. Gember, A. Anand, A. Akella, A comparative study of handheld and non-handheld traffic in campus wi-fi networks, in International Conference on Passive and Active Network Measurement, (2011), 173–183. https://doi.org/10.1007/978-3-642-19260-9_18 |
[77] |
J. Liu, T. Li, G. Chen, Y. Hua, Z. Lei, Mining and modelling the dynamic patterns of service providers in cellular data network based on big data analysis, China Commun., 10 (2013), 25–26. https://doi.org/10.1109/CC.2013.6723876 doi: 10.1109/CC.2013.6723876
![]() |
[78] | S. Dong, D. Zhou, W. Ding, Traffic classification model based on integration of multiple classifiers, J. Comput. Inf. Syst., 8 (2012), 10429–10437. |
[79] |
X. Gui, J. Liu, C. Li, Q. Lv, Z. Lei, Fine-grained analysis of cellular smartphone usage characteristics based on massive network traffic, J. China Univ. Posts Telecommun., 23 (2016), 70–75. https://doi.org/10.1016/S1005-8885(16)60035-3 doi: 10.1016/S1005-8885(16)60035-3
![]() |
[80] | Y. Li, J. Yang, N. Ansari, Cellular smartphone traffic and user behavior analysis, in 2014 IEEE International Conference on Communications (ICC), (2014), 1326–1331. https://doi.org/10.1109/ICC.2014.6883505 |
[81] | M. Z. Shafiq, L. Ji, A. X. Liu, J. Wang, Characterizing and modeling internet traffic dynamics of cellular devices, in Proceedings of the ACM SIGMETRICS Joint International Conference on Measurement and Modeling of Computer Systems, (2011), 305–316. https://doi.org/10.1145/2007116.2007148 |
[82] | Q. Xu, J. Erman, A. Gerber, Z. Mao, J. Pang, S. Venkataraman, Identifying diverse usage behaviors of smartphone apps, in Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference, (2011), 329–344. https://doi.org/10.1145/2068816.2068847 |
[83] | F. T. Vincent, R. Spolaor, M. Conti, I. Martinovic, Appscanner: automatic fingerprinting of smartphone apps from encrypted network traffic, in 2016 IEEE European Symposium on Security and Privacy (EuroS & P), (2016), 439–454. https://doi.org/10.1109/EuroSP.2016.40 |
[84] | M. Shen, J. Zhang, L. Zhu, K. Xu, X. Du, Y. Liu, Encrypted traffic classification of decentralized applications on ethereum using feature fusion, in 2019 IEEE/ACM 27th International Symposium on Quality of Service (IWQoS), (2019), 1–10. https://doi.org/10.1145/3326285.3329053 |
[85] |
G. Aceto, D. Ciuonzo, A. Montieri, A. Pescape, MIMETIC: mobile encrypted traffic classification using multimodal deep learning, Comput. Networks, 165 (2019), 106944. https://doi.org/10.1016/j.comnet.2019.106944 doi: 10.1016/j.comnet.2019.106944
![]() |
[86] |
G. Aceto, D. Ciuonzo, A. Montieri, A. Pescape, Multi-classification approaches for classifying mobile app traffic, J. Network Comput. Appl., 103 (2018), 131–145. https://doi.org/10.1016/j.jnca.2017.11.007 doi: 10.1016/j.jnca.2017.11.007
![]() |
[87] | G. Xie, Q. Li, Y. Jiang, D. Tao, G. Shen, R. Li, et al., SAM: self-attention based deep learning method for online traffic classification, in Proceedings of the Workshop on Network Meets AI & ML, (2020), 14–20. https://doi.org/10.1145/3405671.3405811 |
[88] | C. Liu, L. He, G. Xiong, Z. Cao, Z. Li, Fs-net: a flow sequence network for encrypted traffic classification, in IEEE INFOCOM 2019-IEEE Conference on Computer Communications, (2019), 1171–1179. https://doi.org/10.1109/INFOCOM.2019.8737507 |
[89] |
M. Lopez-Martin, B. Carro, A. Sanchez-Esguevillas, J. Lloret, Network traffic classifier with convolutional and recurrent neural networks for internet of things, IEEE Access, 5 (2017), 18042–18050. https://doi.org/10.1109/ACCESS.2017.2747560 doi: 10.1109/ACCESS.2017.2747560
![]() |
[90] | T. Shapira, Y. Shavitt, Flowpic: encrypted internet traffic classification is as easy as image recognition, in IEEE INFOCOM 2019-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), (2019), 680–687. https://doi.org/10.1109/INFCOMW.2019.8845315 |
[91] | F-SECURE, Threat Description Bluetooth-Worm: SymbOS/Cabir, 2021. Available from: https://www.f-secure.com/v-descs/cabir.shtml. |
[92] | F-SECURE, Mobile Threat Report Q4 2011, 2021. Available from: https://www.f-secure.com/documents/996508/1030743/mobile_threat_report_q4_2011.pdf. |
[93] | F-SECURE, Threat Description Bluetooth-Worm: SymbOS/Cabir, 2021. Available from: https://www.f-secure.com/v-descs/worm_iphoneos_ikee.shtml. |
[94] | GDATASECURITYLAB, FakePlayer, 2021. Available from: https://www.gdata.at/securitylabs/mobile/mobile-malware/. |
[95] | F-SECURE, Mobile Threat Report 2012–2014, 2021. Available from: https://www.f-secure.com/en/web/labs_global/whitepapers. |
[96] | APPTHORITY, Mobile Threat Report, 2021. Available from: http://info.appthority.com/hubfs/website-LEARN-content/Appthority-Mobile-Threat-Report-Q12015.pdf. |
[97] |
S. C. Peng, A survey on malware containment models in smartphones, Appl. Mech. Mater., 263 (2013), 3005–3011. https://doi.org/10.4028/www.scientific.net/AMM.263-266.3005 doi: 10.4028/www.scientific.net/AMM.263-266.3005
![]() |
[98] |
S. PENG, S. Yu, A. Yang, Smartphone malware and its propagation modeling: a survey, Commun. Surv. Tutorials, 16 (2014), 925–941. https://doi.org/10.1109/SURV.2013.070813.00214 doi: 10.1109/SURV.2013.070813.00214
![]() |
[99] |
G. Suarez-Tangil, J. E. Tapiador, P. Peris-Lopez, A. Ribagorda, Evolution, detection and analysis of malware for smart devices, Commun. Surv. Tutorials, 16 (2014), 961–987. https://doi.org/10.1109/SURV.2013.101613.00077 doi: 10.1109/SURV.2013.101613.00077
![]() |
[100] | Y. Zhou, X. Jiang, Dissecting android malware: characterization and evolution, in 2012 IEEE Symposium on Security and Privacy, (2012), 95–109. https://doi.org10.1109/SP.2012.16 |
[101] | Y. Liu, L. Zhang, J. Liang, S. Qu, Z. Ni, Detecting trojan horses based on system behavior using machine learning method, in 2010 International Conference on Machine Learning and Cybernetics, (2010), 855–860. https://doi.org/10.1109/ICMLC.2010.5580591 |
[102] | V. K. Gudipati, A. Vetwal, V. Kumar, A. Adeniyi, A. Abuzneid, Detection of trojan horses by the analysis of system behavior and data packets, in 2015 Long Island Systems, Applications and Technology, (2015), 1–4. https://doi.org/10.1109/LISAT.2015.7160176 |
[103] | J. Nazario, T. Holz, As the net churns: fast-flux botnet observations, in 2008 3rd International Conference on Malicious and Unwanted Software (MALWARE), (2008), 24–31. https://doi.org/10.1109/MALWARE.2008.4690854 |
[104] |
W. Yu, X. Wang, P. Calyam, D. Xuan, W. Zhao, Modeling and detection of camouflaging worm, IEEE Trans. Dependable Secure Comput., 8 (2011), 377–390. https://doi.org/10.1109/TDSC.2010.13 doi: 10.1109/TDSC.2010.13
![]() |
[105] | NSFOCUS Information Technology Co. Ltd., XcodeGhost automatically Checking, 2015. Available from: https://cloud.nsfocus.com/#/krosa/views/initcdr/secalertindex. |
[106] | PANGU JAILBREAK, Statistical Report for XcodeGhost Virus, 2015. Available from: http://x.pangu.io/. |
[107] |
A. Shabtai, U. Kanonov, Y. Elovici, C. Glezer, Y. Weiss, "Andromaly": a behavioral malware detection framework for android devices, J. Intell. Inf. Syst., 38 (2012), 161–190. https://doi.org/10.1007/s10844-010-0148-x doi: 10.1007/s10844-010-0148-x
![]() |
[108] |
Y. Cao, R. Ji, L. Ji, X. Shao, G. Lei, H. Wang, MPTCP-meLearning: a multi-expert learning-based MPTCP extension to enhance multipathing robustness against network attacks, IEICE Trans. Inf. Syst., E104-D (2021). https://doi.org/10.1587/transinf.2021NGP0009 doi: 10.1587/transinf.2021NGP0009
![]() |
[109] |
F. Song, L. Li, I. You, H. Zhang, Enabling heterogeneous deterministic networks with smart collaborative theory, IEEE Network, 35 (2021), 64–71. https://doi.org/10.1109/MNET.011.2000613 doi: 10.1109/MNET.011.2000613
![]() |
[110] |
F. Song, Z. Ai, H. Zhang, I. You, S. Li, Smart collaborative balancing for dependable network components in cyber-physical systems, IEEE Trans. Ind. Inf., 17 (2021), 6916–6924. https://doi.org/10.1109/TII.2020.3029766 doi: 10.1109/TII.2020.3029766
![]() |
[111] | C. J. Wright, Towards Real Time Characterization of Grain Growth from the Melt, Columbia University, 2020. |
[112] |
G. Aceto, D. Ciuonzo, A. Montieri, A. Pescape, DISTILLER: encrypted traffic classification via multimodal multitask deep learning, J. Network Comput. Appl., 183 (2021), 102985. https://doi.org/10.1016/j.jnca.2021.102985 doi: 10.1016/j.jnca.2021.102985
![]() |
[113] |
Z. Bu, B. Zhou, P. Cheng, K. Zhang, Z. Ling, Encrypted network traffic classification using deep and parallel network-in-network models, IEEE Access, 8 (2020), 132950–132959. https://doi.org/10.1109/ACCESS.2020.3010637 doi: 10.1109/ACCESS.2020.3010637
![]() |
[114] | G. Bovenzi, L. Yang, A. Finamore, A first look at class Incremental Learning in Deep Learning Mobile Traffic Classification, preprint, arXiv: 2107.04464. |
[115] |
F. Song, M. Zhu, Y. Zhou, I. You, H. Zhang, Smart collaborative tracking for ubiquitous power IoT in edge-cloud interplay domain, IEEE Internet Things J., 7 (2020), 6046–6055. https://doi.org/10.1109/JIOT.2019.2958097 doi: 10.1109/JIOT.2019.2958097
![]() |
[116] |
F. Song, Z. Ai, Y. Zhou, I. You, R. Choo, H. Zhang, Smart collaborative automation for receive buffer control in multipath industrial networks, IEEE Trans. Ind. Inf., 16 (2020), 1385–1394. https://doi.org/10.1109/TII.2019.2950109 doi: 10.1109/TII.2019.2950109
![]() |
Parameter | Description | unit |
x | Total carbon absorption at time t | billion tons |
y | Total carbon emissions at time t | billion tons |
r1 | The annual growth rate of carbon absorption | - |
N1 | The maximum value of carbon absorption in a certain space | billion tons |
α | The absorption coefficient of carbon emissions corresponding to carbon absorption | - |
r2 | The annual growth rate of carbon emissions | - |
N2 | The maximum environmental capacity of carbon emissions | billion tons |
a | The influence coefficient of the speed of urbanization on the growth of carbon emissions | - |
M | The maximum value of urban carbon emissions | billion tons |
τ | Time of urban ecological process adapting to population migration | years |
Year | 2010 | 2011 | 2012 | 2013 | 2014 | 2015 |
Values/billion ton | 8.122 | 8.794 | 8.979 | 9.219 | 9.257 | 9.226 |
Annual growth rate | - | 0.0764 | 0.0206 | 0.0261 | 0.0041 | -0.0033 |
Year | 2016 | 2017 | 2018 | 2019 | 2020 | 2021 |
Values/billion ton | 9.234 | 9.445 | 9.676 | 9.869 | 9.974 | 10.523 |
Annual growth rate | 0.0009 | 0.0223 | 0.0239 | 0.0195 | 0.0106 | 0.0521 |
Year | 2010 | 2011 | 2012 | 2013 | 2014 | 2015 |
Values/ton | 6.34 | 6.90 | 7.05 | 7.32 | 7.29 | 7.15 |
Annual growth rate | - | 0.082 | 0.021 | 0.038 | -0.004 | -0.021 |
Year | 2016 | 2017 | 2018 | 2019 | 2020 | 2021 |
Values/ton | 7.12 | 7.23 | 7.49 | 7.61 | 8.08 | 8.44 |
Annual growth rate | -0.004 | 0.016 | 0.034 | 0.016 | 0.059 | 0.043 |
Parameters | r1 | r2 | N1 | N2 | M | α | a |
Ranges | (0.02,0.05) | (−0.01,0.02) | (7,12) | (12,16) | (11,12) | 0.95 | (1,3) |
Parameter | Description | unit |
x | Total carbon absorption at time t | billion tons |
y | Total carbon emissions at time t | billion tons |
r1 | The annual growth rate of carbon absorption | - |
N1 | The maximum value of carbon absorption in a certain space | billion tons |
α | The absorption coefficient of carbon emissions corresponding to carbon absorption | - |
r2 | The annual growth rate of carbon emissions | - |
N2 | The maximum environmental capacity of carbon emissions | billion tons |
a | The influence coefficient of the speed of urbanization on the growth of carbon emissions | - |
M | The maximum value of urban carbon emissions | billion tons |
τ | Time of urban ecological process adapting to population migration | years |
Year | 2010 | 2011 | 2012 | 2013 | 2014 | 2015 |
Values/billion ton | 8.122 | 8.794 | 8.979 | 9.219 | 9.257 | 9.226 |
Annual growth rate | - | 0.0764 | 0.0206 | 0.0261 | 0.0041 | -0.0033 |
Year | 2016 | 2017 | 2018 | 2019 | 2020 | 2021 |
Values/billion ton | 9.234 | 9.445 | 9.676 | 9.869 | 9.974 | 10.523 |
Annual growth rate | 0.0009 | 0.0223 | 0.0239 | 0.0195 | 0.0106 | 0.0521 |
Year | 2010 | 2011 | 2012 | 2013 | 2014 | 2015 |
Values/ton | 6.34 | 6.90 | 7.05 | 7.32 | 7.29 | 7.15 |
Annual growth rate | - | 0.082 | 0.021 | 0.038 | -0.004 | -0.021 |
Year | 2016 | 2017 | 2018 | 2019 | 2020 | 2021 |
Values/ton | 7.12 | 7.23 | 7.49 | 7.61 | 8.08 | 8.44 |
Annual growth rate | -0.004 | 0.016 | 0.034 | 0.016 | 0.059 | 0.043 |
Parameters | r1 | r2 | N1 | N2 | M | α | a |
Ranges | (0.02,0.05) | (−0.01,0.02) | (7,12) | (12,16) | (11,12) | 0.95 | (1,3) |