An Efficient Approach for Analyzing Multidimensional Network Traffic

被引:0
|
作者
Yang, Jia [1 ]
Ma, Hao [1 ]
Zhang, Bei [1 ]
Chen, Ping [1 ]
机构
[1] Peking Univ, Beijing 100871, Peoples R China
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Identifying dominant network flows is important for network anomaly detection. Estan et al. proposed an algorithm that effectively detects dominant network flows by constructing multidimensional clusters based on a "natural hierarchy" existing in the five-tuple information of network flows. Wang et al. improved this algorithm by significantly reducing its computational complexity. In practice, however, the algorithm's execution time may be relatively long when handling large volumes of traffic with a low threshold. In this paper, we introduce a practical technique that further improves the time efficiency of Wang et al.'s algorithm. Our approach simplifies network traffic's hierarchical structure by utilizing local IP subnet information. The comparative performance of our approach and Wang et al.'s algorithm is evaluated using real NetFlow data collected at a large campus network. The experimental results demonstrate that our algorithm is much more time efficient than Wang et al.'s algorithm.
引用
收藏
页码:227 / 235
页数:9
相关论文
共 50 条
  • [41] Traffic profiling for efficient network resource utilization
    Kalapriya, K
    Raghucharan, BR
    Lele, AM
    Nandy, SK
    [J]. IC'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTERNET COMPUTING, VOLS 1 AND 2, 2003, : 789 - 795
  • [42] A Unified Approach to Network Traffic and Network Security Visualisation
    Read, Huw
    Blyth, Andrew
    Sutherland, Iain
    [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-8, 2009, : 614 - 619
  • [43] Network Security: Approach Based on Network Traffic Prediction
    Thakare, Sheetal
    Pund, Anshuman
    Pund, M. A.
    [J]. PROCEEDING OF THE INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS, BIG DATA AND IOT (ICCBI-2018), 2020, 31 : 41 - 55
  • [44] An Efficient Approach for Vehicle Traffic Monitoring by Collaborating Vehicular Mobility Module and Network Simulator 3
    Anupriya, V
    Sangavi, S.
    Shivani, P. C.
    Dharany, P. Vinu
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS 2020), 2020, : 379 - 384
  • [45] Adapting Traffic Simulation for Traffic Management: A Neural Network Approach
    Passow, Benjamin N.
    Elizondo, David
    Chiclana, Francisco
    Witheridge, Simon
    Goodyer, Eric
    [J]. 2013 16TH INTERNATIONAL IEEE CONFERENCE ON INTELLIGENT TRANSPORTATION SYSTEMS - (ITSC), 2013, : 1402 - 1407
  • [46] An efficient approach for solving nonlinear multidimensional Schrodinger equations
    Karabas, Neslisah Imamoglu
    Korkut, Sila Ovgu
    Tanoglu, Gamze
    Aziz, Imran
    Siraj-ul-Islam
    [J]. ENGINEERING ANALYSIS WITH BOUNDARY ELEMENTS, 2021, 132 : 263 - 270
  • [47] Insights into Encrypted Network Connections: Analyzing Remote Desktop Protocol Traffic
    Ussath, Martin
    Cheng, Feng
    Meinel, Christoph
    [J]. 2016 24TH EUROMICRO INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED, AND NETWORK-BASED PROCESSING (PDP), 2016, : 585 - 589
  • [48] Analyzing the Impact of On-chip Network Traffic on Program Phases for CMPs
    Zhang, Yu
    Ozisikyilmaz, Berkin
    Memik, Gokhan
    Kim, John
    Choudhary, Alok
    [J]. ISPASS 2009: IEEE INTERNATIONAL SYMPOSIUM ON PERFORMANCE ANALYSIS OF SYSTEMS AND SOFTWARE, 2009, : 218 - 226
  • [49] Analyzing Traffic Crash Severity With Combination of Information Entropy and Bayesian Network
    Zong, Fang
    Chen, Xiangru
    Tang, Jinjun
    Yu, Ping
    Wu, Ting
    [J]. IEEE ACCESS, 2019, 7 : 63288 - 63302
  • [50] Detecting DDoS attacks by analyzing the dynamics and interrelation of network traffic characteristics
    Krasnov, A. E.
    Nadezhdin, E. N.
    Nikol'skii, D. N.
    Repin, D. S.
    Galyaev, V. S.
    [J]. VESTNIK UDMURTSKOGO UNIVERSITETA-MATEMATIKA MEKHANIKA KOMPYUTERNYE NAUKI, 2018, 28 (03): : 407 - 418