181,800 Hits in 5.3 sec

A statistical approach to IP-level classification of network traffic

Manuel Crotti, Francesco Gringoli, Paolo Pelosato, Luca Salgarelli
2006 2006 IEEE International Conference on Communications  
By means of a simple, lightweight algorithm based on the notion of anomaly scores, also presented in this paper, an unknown flow can be compared against known protocol fingerprints, detecting the application  ...  With the ever increasing number of network protocols and services running on nonstandard TCP ports, the classification methods based the analysis of the transport layer header are rapidly becoming ineffective  ...  flow, connection and so on) and they can be successfully exploited by Nearest Neighbor and Linear Discriminant Analysis algorithms.  ... 
doi:10.1109/icc.2006.254723 dblp:conf/icc/CrottiGPS06 fatcat:budlxutsd5bwnjlbaq3u3mb4aa

A Novel Traffic Shaping Algorithm for SDN-Sliced Networks using a New WFQ Technique

Ronak Al-Haddad, Erika Sanchez, Arooj Fatima, Adrian Winckles
2021 International Journal of Advanced Computer Science and Applications  
SDN networks are controlled by floodlight controller(s) and FlowVisor, the slicing controller, which characterise the behaviour of such networks.  ...  The Differentiated Service (DiffServ) protocol is used to define classes in order to make network traffic patterns more sensitive to the video, audio and data traffic classes, by specifying precedence  ...  Classification of traffic requires encrypted flow packets that mask flow features.  ... 
doi:10.14569/ijacsa.2021.0120101 fatcat:qpndyvv4bvfnffggjpglxiym2e

Improving Convergence of Congestion Control Algorithm

Abhineet Anand, Abhijeet Abhijeet, D P Das
2013 International Journal of Computer Applications  
The available bandwidth of the link is grabbed by the newly-starting flow, when it joins the network. The various algorithm has been discussed to improve the convergence efficiently.  ...  To achieve the convergence up to level of fairness the network where the existing flow have taken the whole bandwidth, it is assured that this new flow should achieve fair bandwidth allocation as soon  ...  At the same time, theoretical analysis according to stability and convergence has determined the impact of control parameters on the algorithm performance, and favorable performance of the algorithm has  ... 
doi:10.5120/13981-1977 fatcat:jdj4qgp63jaojfime7tptssyo4

On the fairness characteristics of FAST TCP

Tuan A. Trinh, Balázs Sonkoly, Sándor Molnár
2009 Annales des télécommunications  
Fairness of competing transmission control protocol (TCP) flows is an integral and indispensable part of transport protocol design for next-generation, high-bandwidth-delay product networks.  ...  We also show that this behavior is a rather robust property of the protocol concerning different traffic mix or network topology.  ...  In our simulations, the end of this phase depends on the protocol version.  ... 
doi:10.1007/s12243-009-0145-7 fatcat:wf6ab3dob5hondhsce6meyayba

Traffic classification through simple statistical fingerprinting

Manuel Crotti, Maurizio Dusi, Francesco Gringoli, Luca Salgarelli
2007 Computer communication review  
The classification of IP flows according to the application that generated them is at the basis of any modern network management platform.  ...  In this paper we present a flow classification mechanism based on three simple properties of the captured IP packets: their size, inter-arrival time and arrival order.  ...  The approach shown by Nilsson et al. [15] focuses on the statistical analysis of network traffic and shows promising results for fine-grained protocol classification.  ... 
doi:10.1145/1198255.1198257 fatcat:klel37pmefd6zjvn7ounodd47e

Efficiency-complexity evaluation methods of routing algorithms in mobile ad hoc networks

Belma Memić, Alem Čolaković, Adisa Hasković Džubur, Elma Avdagić-Golub
2021 Science, Engineering and Technology  
Routing in multidomain and multilayer networks is the subject of constant theoretical research, with special emphasis on routing optimization algorithms based on several criteria.  ...  Routing algorithms depend on the goals to be achieved and most often solve a certain group of problems with certain simplifications of the overall problem and to the detriment of performance that are not  ...  This means that the virtual backbone is formed independently of the data flow in the network and depends only on the topology.  ... 
doi:10.54327/set2021/v1.i2.12 fatcat:wuygro2fozdwbbvz5uy3d6rsqq

New approach for network monitoring and intrusion detection [article]

Vladimir Gudkov, Joseph E. Johnson
2001 arXiv   pre-print
The approach for a network behavior description in terms of numerical time-dependant functions of the protocol parameters is suggested.  ...  This provides a basis for application of methods of mathematical and theoretical physics for information flow analysis on network and for extraction of patterns of typical network behavior.  ...  This work was supported by the DARPA Information Assurance and Survivability Program and is administered by the USAF Air Force Research Laboratory via grant F30602-99-2-0513, as modified.  ... 
arXiv:cs/0110019v1 fatcat:jkqpqo5ltbhcnaxx6lt3y35yji

Self-learning method for industrial firewall rules based on hash algorithm [chapter]

Y Lei, W Shang, M Wan, P Zeng
2015 Network Security and Communication Engineering  
This paper proposes a self-learning algorithm based on statistical analysis of log rules, it dynamically generates and updates rules, using hash algorithm to add up the number of data flow, and resulting  ...  In order to realize intrusion detection of the new unknown industrial virus, a self-learning algorithm is needed to study the information model and behavior characteristics of network communication in  ...  Algorithm flow Rules self-learning method is based on statistical analysis model.  ... 
doi:10.1201/b18660-40 fatcat:t3hm2j3xhvhslfm4pjigx4tvhe

A Review on Swarm Intelligence Based Routing Approaches

Bhanumathi Velusamy, Sangeetha Chitteth Pushpan
2019 International Journal of Engineering and Technology Innovation  
and network flow, and QoS aware protocols.  ...  This paper will be helpful to the researchers as a reference on bio-inspired algorithms for new protocol designs and also for the proper selection of routing protocols according to the type of applications  ...  PEADD depends on ant colony optimization and aims at maximizing the network lifetime by considering the high residual energy paths for data transmission. CRP is also based on an ant colony algorithm.  ... 
doaj:56ab609b676f427a8b33de5b5612e59f fatcat:i2bl23xb6rdq7bj5vdx3i3iufm

Multidimensional Network Monitoring for Intrusion Detection [article]

Vladimir Gudkov, Joseph E. Johnson
2002 arXiv   pre-print
An approach for real-time network monitoring in terms of numerical time-dependant functions of protocol parameters is suggested.  ...  Applying complex systems theory for information flow analysis of networks, the information traffic is described as a trajectory in multi-dimensional parameter-time space with about 10-12 dimensions.  ...  To estimate the dimension of the information flow on the network one can apply the algorithm for analysis of observed chaotic data in physical systems, the algorithm suggested in paper [13] (see also  ... 
arXiv:cs/0206020v1 fatcat:wsrfuvuxvrhs7k7vpbzmtm2p4q

Network traffic classification techniques and challenges

Noora Al Khater, Richard E Overill
2015 2015 Tenth International Conference on Digital Information Management (ICDIM)  
And where the final published version is provided on the Research Portal, if citing you are again advised to check the publisher's website for any subsequent corrections.  ...  If citing, it is advised that you check and use the publisher's definitive version for pagination, volume/issue, and date of publication details.  ...  This paper provides a critical review of the field of network traffic analysis, and focuses on the use of ML algorithms to classify internet traffic.  ... 
doi:10.1109/icdim.2015.7381869 dblp:conf/icdim/KhaterO15 fatcat:tjabveqzgjaevbrdwqmhrt6gpy

Network Attack Detection at Flow Level [chapter]

Aleksey A. Galtsev, Andrei M. Sukhov
2011 Lecture Notes in Computer Science  
In this paper, we propose a new method for detecting unauthorized network intrusions, based on a traffic flow model and Cisco NetFlow protocol application.  ...  The method developed allows us not only to detect the most common types of network attack (DDoS and port scanning), but also to make a list of trespassers' IP-addresses.  ...  Analysis of all data on the network, represented by individual points on the plane with axes, which are plotted the number of active flows and utilization of the network, allows to the definition of three  ... 
doi:10.1007/978-3-642-22875-9_30 fatcat:hck5nwvgpbdv3keclu4v2w2i3u


Vaclav Oujezsky, Tomas Horvath
2017 Informatyka Automatyka Pomiary w Gospodarce i Ochronie Środowiska  
The output file is a database of information and analysis of the overall UNIX time duration of reported traffic and analysis of NetFlow lifetime.  ...  The software is developed to work with Python version 3 and higher and is designed for the Windows operating system.  ...  Acknowledgment Research and development described in this paper was financed by the National Sustainability Program under grant LO1401. For the research, infrastructure of the SIX Center was used.  ... 
doi:10.5604/01.3001.0010.4823 fatcat:yfusoqdcvjghleepqjvuoqs34i

Fluid flow approximation of time-limited TCP/UDP/XCP streams

J. Domańska, A. Domański, T. Czachórski, J. Klamka
2014 Bulletin of the Polish Academy of Sciences: Technical Sciences  
This article presents the use of fluid flow approximation to model interactions between a set of TCP, UDP and XCP flows in the environment of IP routers using AQM (Active Queue Management) algorithms to  ...  In contrast to other works, independent UDP and TCP streams are considered and the model allows to start and end data transmissions in TCP, UDP and XCP streams at any time moment.  ...  This research was partially financed by the Polish Ministry of Science and Higher Education under the project No. N N516479640.  ... 
doi:10.2478/bpasts-2014-0021 fatcat:qa2vdsg7c5eifahv7dk4ripg5e

Multipath TCP in LTE Networks

Ondrej Vondrous, Peter Macejko, Zbynek Kocur
2014 Advances in Electrical and Electronic Engineering  
When Multipath TCP is used the behavior of this protocol is consistent in situation of adding new sub-flow or removing flow on a faulty line.  ...  The results of experiments with Multipath TCP (Multipath Transmission Control Protocol) in LTE (3GPP Long Term Evolution) networks are presented.  ...  Acknowledgment This work was supported by Ministry of the Interior of the Czech Republic Grant no.  ... 
doi:10.15598/aeee.v12i4.1210 fatcat:s2adtgioznenvbzf74s64w4dcy
« Previous Showing results 1 — 15 out of 181,800 results