Service Violation Monitoring Model for Detecting and Tracing Bandwidth Abuse

被引:0
|
作者
Abdulghani Ali Ahmed
Aman Jantan
Mohammed Rasmi
机构
[1] Universiti Sains Malaysia,School of Computer Sciences
关键词
RED gateways; Service level agreement; Distributed monitoring; Malicious users; Source machine traceback;
D O I
暂无
中图分类号
学科分类号
摘要
Bandwidth abuse is a critical Internet service violation. However, its origins are difficult to detect and trace given similarities between abusive and normal traffic. So far, there is no capable and scalable mechanism to deal with bandwidth abuse. This paper proposes a distributed edge-to-edge model for monitoring service level agreement (SLA) violations and tracing abusive traffic to its origins. The mechanism of policing misbehaving user traffic at a single random early detection (RED) gateway is used in the distributed monitoring of SLA violations, including violations carried out through several gateways. Each RED gateway reports misbehaving users who have been sent notifications of traffic policing to an SLA monitoring unit. Misbehaving users are considered suspicious users and their consumed bandwidth shares are aggregated at every gateway to be compared with SLA-specified ratios. Bandwidth is abused when SLA-specified ratios are exceeded. By reporting bandwidth abuse, illegitimate users can be isolated from legitimate ones and source hosts of abusive traffic may be traced. Approximate simulation results show that the proposed model can detect any SLA violation and identify abusive users. In addition, the proposed model can trace user violations back to their source machines in real time.
引用
收藏
页码:218 / 237
页数:19
相关论文
共 50 条
  • [1] Service Violation Monitoring Model for Detecting and Tracing Bandwidth Abuse
    Ahmed, Abdulghani Ali
    Jantan, Aman
    Rasmi, Mohammed
    [J]. JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2013, 21 (02) : 218 - 237
  • [2] A Novel Violation Tracing Model for Cloud Service Accountability
    Li, Xiaojian
    Li, Bo
    Wang, Hailan
    Zhang, Jiajia
    Yang, Haopeng
    Liu, Jingang
    [J]. 2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 744 - 750
  • [3] Detecting, Tracing, and Monitoring Architectural Tactics in Code
    Mirakhorli, Mehdi
    Cleland-Huang, Jane
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2016, 42 (03) : 206 - 221
  • [5] MARKERS FOR DETECTING ALCOHOLISM AND FOR MONITORING FOR CONTINUED ABUSE
    MORGAN, MY
    [J]. DRUG AND ALCOHOL DEPENDENCE, 1980, 6 (1-2) : 4 - 4
  • [6] On detecting service violations and bandwidth theft in QoS network domains
    Habib, A
    Fahmy, S
    Avasarala, SR
    Prabhakar, V
    Bhargava, B
    [J]. COMPUTER COMMUNICATIONS, 2003, 26 (08) : 861 - 871
  • [7] Substance abuse monitoring by the correctional service of Canada
    Fraser, AD
    Zamecnik, J
    [J]. THERAPEUTIC DRUG MONITORING, 2002, 24 (01) : 187 - 191
  • [8] DETECTING ALCOHOLISM AND DRUG-ABUSE - A HOSPITAL INTERVENTION SERVICE (HIS)
    ENNIS, A
    DOYLE, J
    DOHERTY, R
    FREEMAN, RB
    [J]. JOURNAL OF ADDICTIVE DISEASES, 1995, 14 (01) : 135 - 135
  • [9] Detecting Pulsing Denial-of-Service attacks based on the bandwidth usage condition
    Tsunoda, Hiroshi
    Arai, Kenjirou
    Waizumi, Yuji
    Ansari, Nirwan
    Nemoto, Yoshiaki
    [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13, 2008, : 1670 - +
  • [10] Detecting grid-abuse attacks by source-based monitoring
    Wu, JJ
    Cheng, D
    Zhao, W
    [J]. PARALLEL AND DISTRIBUTED COMPUTING SYSTEMS, 2004, : 565 - 571