期刊文献+

Characterizing Internet Backbone Traffic Based on Deep Packets Inpection and Deep Flows Inspection 被引量:4

Characterizing Internet Backbone Traffic Based on Deep Packets Inpection and Deep Flows Inspection
下载PDF
导出
摘要 Based on the massive data collected with a passive network monitoring equipment placed in China's backbone, we present a deep insight into the network backbone traffic and evaluate various ways for inproving traffic classifying efficiency in this pa- per. In particular, the study has scrutinized the net- work traffic in terms of protocol types and signatures, flow length, and port distffoution, from which mean- ingful and interesting insights on the current Intemet of China from the perspective of both the packet and flow levels are derived. We show that the classifica- tion efficiency can be greatly irrproved by using the information of preferred ports of the network applica- tions. Quantitatively, we find two traffic duration thresholds, with which 40% of TCP flows and 70% of UDP flows can be excluded from classification pro- cessing while the in^act on classification accuracy is trivial, i.e., the classification accuracy can still reach a high level by saving 85% of the resources. Based on the massive data collected with a passive network monitoring equipment placed in China's backbone,we present a deep insight into the network backbone traffic and evaluate various ways for improving traffic classifying efficiency in this paper.In particular,the study has scrutinized the network traffic in terms of protocol types and signatures,flow length,and port distribution,from which meaningful and interesting insights on the current Internet of China from the perspective of both the packet and flow levels are derived.We show that the classification efficiency can be greatly improved by using the information of preferred ports of the network applications.Quantitatively,we find two traffic duration thresholds,with which 40% of TCP flows and 70% of UDP flows can be excluded from classification processing while the impact on classification accuracy is trivial,i.e.,the classification accuracy can still reach a high level by saving 85% of the resources.
出处 《China Communications》 SCIE CSCD 2012年第5期42-54,共13页 中国通信(英文版)
基金 This paper was partially supported by the National Natural Science Foundation of China under Crant No. 61072061 111 Project of China under Crant No. B08004 the Fundamental Research Funds for the Central Universities under Grant No. 2009RC0122. References
关键词 network traffic traffic characterization traffic monitoring PACKET flow 互联网骨干网 净流量 基础 检查 流动 表征 网络应用 信息分类
  • 相关文献

参考文献23

  • 1http://www.c 114.net/topic/1358/a413769.html.
  • 2COSTA C, CUNHA I, BORGES A, et al. Analyzing Client Interactivity in Streanmg Media [C]// Proceedings of the 13th International Conference on World Wide Web: May 17-22, 2004, NY, USA. ACM Press, 2004: 534-543.
  • 3MAHANTI A, WIIJJAMSON C, EACGER D. Taffic Analy- sis of a Web Proxy Caching Hierarchy[J]. IEEE Network, 2000, 14(3): 16-23.
  • 4SRIPANIDKULCHAI K, MAGGS B, ZHANG Hui. An A- nalysis of Live StrearNng Workloads on the Intemet[C]// Proceedings of the 4th ACM SIC~;OMM Conference on Intemet Measurement: October 25-27, 2004, Taormina, Sici- ly, Italy. ACM Press, 2004: 41-54.
  • 5CIFLIKLI C, GEZER A, OZSAHIN A, et al. Turkey Corn-parison of Bittorrent Packet Traffic Characteristics over IPv6 and lPv4[J]. Application of Inforrmtion and Connm- nication Technologies, 2009: 1-5.
  • 6MAIER G, FELDMANN A, PAXSON V, et al. On Domi- nant Characteristics of Residential Broadband Intemet Traffic[C]//Proceedings of the 9th ACM SIGCOMM Con- ference on Intemet Measurerr~nt Conference: November 4-6, 2009, Chicago, IL, USA. ACM Press, 2009: 90-102.
  • 7SARO1U S, GUMMADI K, DUMN R, et al. An Analysis of Intemet Content Delivery Systerm[C]//Proceedings of the 5th Symposium on Operating Systerva Design and Imple- mentation, December 2002, Boston, MA. ACM SIGOPS Operating Systerm Review, 2002, 36(SI): 315-327.
  • 8I,EIFIOWITZ N, RIPEANU M, WIERZBICKI A. Decon- structing the Kazaa Network[C]// Proceedings of the 3rd IEEE~ Workshop on Intemet Applications : June 23-24, 2003. 1EEE Conputer Society, 2003: 112-120.
  • 9SEN S, WANG Jia. Analyzing Peer-to-Peer Traffic Across Large Networks [J]. 1EEE/ACM Transactions on Networ- king, 2004, 12(2): 219-232.
  • 10ERMAN J, MAHANTI A, ARLITT M, et al. Identifying and Discriminating between Web and Peer-to-Peer Traffic in the Network Core[C]//Proceedings of the 16th interna- tional conference on World Wide Web, 2007: 883-892.

同被引文献25

引证文献4

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部