Collecting and Characterizing a Real Broadband Access Network Traffic Dataset

被引:0
|
作者
Lopez, Martin Andreoni [1 ,3 ]
Silva, Renato Souza [2 ]
Alvarenga, Igor D. [1 ]
Rebello, Gabriel A. F. [1 ]
Sanz, Igor J. [1 ]
Lobato, Antonio G. P. [1 ]
Mattos, Diogo M. F. [1 ,3 ]
Duarte, Otto C. M. B. [1 ]
Pujolle, Guy [3 ]
机构
[1] Univ Fed Rio de Janeiro COPPE UFRJ, Grp Teleinformat & Automacao, Rio De Janeiro, Brazil
[2] Univ Fed Rio de Janeiro COPPE UFRJ, Lab Redes Alta Velocidade RAVEL, Rio De Janeiro, Brazil
[3] UPMC Univ Paris 06, Paris Sorbonne Univ 6, Lab Informat, Paris, France
关键词
ANOMALY DETECTION; INTERNET;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Broadband Internet access security relies in the implementation of perimeter policies and in the adoption of access control lists. These measures are precarious because they are based on common and not frequently updated profiles that lack residential users threat information. In this paper, we analyze and profile residential users traffic from fixed broadband Internet access networks of a large telecommunication operator for a period of one week, and we obtain the profile of security alarms generated by an intrusion detection system. The results show that the proposed characterization allows the classification of alerts with a sensitivity of 93% in the differentiation of legitimate and anomalous flows and allows a 73% reduction of the traffic directed to the traffic analyzer, thus validating the collected dataset and enabling more dynamic and efficient access network security.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] Network game traffic: A broadband access perspective
    Sinha, A
    Mitchell, K
    Medhi, D
    [J]. COMPUTER NETWORKS, 2005, 49 (01) : 71 - 83
  • [2] Characterization of Bit Torrent Traffic in a Broadband Access Network
    Moczar, Zoltan
    Molnar, Sandor
    [J]. ACCESS NETWORKS, 2011, 63 : 176 - 183
  • [3] A real time traffic engineering scheme for broadband convergence network(BcN)
    Kim, Hwa-Jong
    Jeong, Myoung-Soon
    Kim, Jong-Won
    [J]. SIGMAP 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND MULTIMEDIA APPLICATIONS, 2007, : 368 - +
  • [4] Pragmatic modeling of broadband access traffic
    Roughan, M
    Kalmanek, C
    [J]. COMPUTER COMMUNICATIONS, 2003, 26 (08) : 804 - 816
  • [5] Characterizing the Gaming Traffic of World of Warcraft: From Game Scenarios to Network Access Technologies
    Wang, Xiaofei
    Kwon, Ted 'Taekyoung'
    Choi, Yanghee
    Chen, Min
    Zhang, Yan
    [J]. IEEE NETWORK, 2012, 26 (01): : 27 - 34
  • [6] Broadband communication in the access network
    Ghobrial, A
    Adhami, R
    [J]. CIC '04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN COMPUTING, 2004, : 3 - 8
  • [7] Network Technologies for Broadband Access
    Moeyaert, Veronique
    Maier, Guido
    [J]. 2011 13TH INTERNATIONAL CONFERENCE ON TRANSPARENT OPTICAL NETWORKS (ICTON), 2011,
  • [8] Broadband access network for the future
    Jones, J.Richard
    [J]. Telecommunications (International Edition), 1996, 30 (10):
  • [9] The intelligent broadband access network
    White, S
    Hernandez, R
    Bodzinga, A
    Bocker, GJ
    [J]. NETWORKS 2004 11TH INTERNATIONAL TELECOMMUNICATIONS NETWORK STRATEGY AND PLANNING SYMPOSIUM, PROCEEDINGS, 2004, : 417 - 422
  • [10] Security of Broadband Access Network
    Wang Deqiang(Network Division of ZTE Corporation
    [J]. ZTE Communications, 2007, (01) : 37 - 41