Service Violation Monitoring Model for Detecting and Tracing Bandwidth Abuse

被引:0
|
作者
Abdulghani Ali Ahmed
Aman Jantan
Mohammed Rasmi
机构
[1] Universiti Sains Malaysia,School of Computer Sciences
关键词
RED gateways; Service level agreement; Distributed monitoring; Malicious users; Source machine traceback;
D O I
暂无
中图分类号
学科分类号
摘要
Bandwidth abuse is a critical Internet service violation. However, its origins are difficult to detect and trace given similarities between abusive and normal traffic. So far, there is no capable and scalable mechanism to deal with bandwidth abuse. This paper proposes a distributed edge-to-edge model for monitoring service level agreement (SLA) violations and tracing abusive traffic to its origins. The mechanism of policing misbehaving user traffic at a single random early detection (RED) gateway is used in the distributed monitoring of SLA violations, including violations carried out through several gateways. Each RED gateway reports misbehaving users who have been sent notifications of traffic policing to an SLA monitoring unit. Misbehaving users are considered suspicious users and their consumed bandwidth shares are aggregated at every gateway to be compared with SLA-specified ratios. Bandwidth is abused when SLA-specified ratios are exceeded. By reporting bandwidth abuse, illegitimate users can be isolated from legitimate ones and source hosts of abusive traffic may be traced. Approximate simulation results show that the proposed model can detect any SLA violation and identify abusive users. In addition, the proposed model can trace user violations back to their source machines in real time.
引用
收藏
页码:218 / 237
页数:19
相关论文
共 50 条
  • [41] Monitoring Web service networks in a model-based approach
    Yan, YH
    Pencolé, Y
    Cordier, MO
    Grastien, A
    [J]. THIRD EUROPEAN CONFERENCE ON WEB SERVICES, PROCEEDINGS, 2005, : 192 - 203
  • [42] Optimizing the distributed network monitoring model with bounded bandwidth and delay constraints by neural networks
    Liu, XH
    Yin, JP
    Cai, ZP
    Lu, XC
    Chen, SM
    [J]. ADVANCES IN NEURAL NETWORKS - ISNN 2005, PT 1, PROCEEDINGS, 2005, 3496 : 805 - 810
  • [43] A Blockchain-Based Model for Cloud Service Quality Monitoring
    Taghavi, Mona
    Bentahar, Jamal
    Otrok, Hadi
    Bakhtiyari, Kaveh
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2020, 13 (02) : 276 - 288
  • [44] Optimizing the distributed network monitoring model with bounded bandwidth and delay constraints by Genetic Algorithm
    Liu, XH
    Yin, JP
    Cai, ZP
    Huang, XY
    Chen, SM
    [J]. ADVANCES IN NATURAL COMPUTATION, PT 2, PROCEEDINGS, 2005, 3611 : 913 - 921
  • [45] Extended CEP Model for Effective Enterprise Systems Service Monitoring
    Kum, Deuk Kyu
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (02): : 807 - 825
  • [46] Identifying perceived barriers to monitoring service quality among substance abuse treatment providers in South Africa
    Myers, Bronwyn
    Petersen, Zainonisa
    Kader, Rehana
    Koch, J. Randy
    Manderscheid, Ron
    Govender, Rajen
    Parry, Charles D. H.
    [J]. BMC PSYCHIATRY, 2014, 14
  • [47] Identifying perceived barriers to monitoring service quality among substance abuse treatment providers in South Africa
    Bronwyn Myers
    Zainonisa Petersen
    Rehana Kader
    J Randy Koch
    Ron Manderscheid
    Rajen Govender
    Charles DH Parry
    [J]. BMC Psychiatry, 14
  • [48] Designing a monitoring network for detecting groundwater pollution with stochastic simulation and a cost model
    M. F. P. Bierkens
    [J]. Stochastic Environmental Research and Risk Assessment, 2006, 20 : 335 - 351
  • [49] Designing a monitoring network for detecting groundwater pollution with stochastic simulation and a cost model
    Bierkens, MFP
    [J]. STOCHASTIC ENVIRONMENTAL RESEARCH AND RISK ASSESSMENT, 2006, 20 (05) : 335 - 351
  • [50] A social network based bandwidth sharing model for P2P streaming service
    College of Computer Science and Technology, Jilin University, Changchun, China
    [J]. Int. J. u e Serv. Sci. Technol., 2 (171-180): : 171 - 180