期刊文献+

网络流场:理论和方法 被引量:3

Network Flow Field: Theory and Method
下载PDF
导出
摘要 随着互联网的迅猛发展,网络运营部门和网络管理部门迫切需要分析网络的运行状况,以保证网络的可用性、稳定性和安全性。然而,目前对网络运行状况的分析难度正逐渐增大,用户数量的快速增长,网络带宽的不断增加,网络流量的频繁变化以及新应用日趋复杂等,均给网络流量分析带来了巨大的挑战。因此,为了解决目前网络分析技术面临的难题和挑战,提出了一种网络流量分析的新型方法——网络流场理论和方法。网络流场不仅关注如数据包及网络流等"硬性"指标,而且更关注网络中的流量分布和发展趋势,因此能反映出网络流的分布以及节点之间的关系,从而反映网络的社会属性。网络流场以全新的视角对网络进行剖析,并进行定性和定量的分析,不仅能分析网络流量的基本信息,而且可以挖掘网络中的隐含信息,如时序关系、状态转换关系、私有网络拓扑、关键节点和关键路径等。实验结果表明,网络流场可以取得很好的分析效果,网络流场理论既可以有效地为现有的网络管理及网络分析提供更高层次的研究架构和研究模型,指导网络管理、分析、测量及安全保障等领域的研究和实践,又有利于网络的发展和技术的进步。 Along with the rapid development of Intemet, the Internet service providers (ISPs) and network manage- ment departments are urgent to analyze the operating state of Internet, in order to guarantee the usability, stability and security of Internet. However, due to the rapidly growing user number, the ever increasing Intemet bandwidth, the continuous change of traffic characteristics and the more and more complexity of the new emerging applications, it is facing with more and more challenges for network analysis. Therefore, in order to solve these issues, this paper proposes a novel analysis theory and method, named as network flow field. Network flow field not only concerns the "solid" metrics such as network packets and flows, but also pays more attention to the distribution and trend of network traffic, so it can reveal the traffic distribution and the relationship among network hosts, thus can reflect the social attributes of Internet. Based on the qualitative and quantitative analysis, network flow field theory and methodcan analyze the network deeply by using a new kind of view, it can not only obtain the basic statistical information of network traffic, bus also dig out its secret and implication information, such as timing relationship, state transition relationship, private network topology, key paths and key nodes, etc. The experimental results show that network flow field theory and method can achieve a good performance. Therefore, network flow field theory can provide the efficient framework and model for network traffic analysis, so as to guide the further research of network manage- ment, analysis and measurement field.
出处 《计算机科学与探索》 CSCD 2014年第1期1-17,共17页 Journal of Frontiers of Computer Science and Technology
基金 国家科技支撑计划 No.2012BAH42B04~~
关键词 网络流场 节点 通信行为 流簇 流关联 network flow field node communication behaviors flow cluster flow association
  • 相关文献

参考文献10

  • 1Bram Cohen.Incentives Build Robustness in BitTorrent[].Proc of the st Workshop on the Economics of Peer--Peer Systems.2003
  • 2S. Zander,T. Nguyen,G. Armitage.Self-learning IP traffic classification based on statisticalflow characteristics[].Passive and Active Network Measurement.2005
  • 3Jun Zhang,Yang Xiang,Yu Wang,Wanlei Zhou,Yong Xiang,Yong Guan.Network Traffic Classification Using Correlation Information[].Parallel and Distributed Systems IEEE Transactions on.2013
  • 4Xue Yibo,Zhang Luoshi,Wang Dawei.Traffic classification:issues and challenges[].Journal of Communication.2013
  • 5Roughan M,Subhabrata S,Spatscheck O,et al.Class-of-service mapping for QoS:a statistical signature-based approach to IP traffic classification[].IMC’:Proceedings of the th ACM SIG-COMM conference on Internet measurement.2004
  • 6IANA,Internet Corporation for Assigned Names and Numbers.Service name and transport protocol port number registry. http://www.iana.org/assignments/port-numbers . 2013
  • 7The secure sockets layer(SSL)protocol Version 3.0. http://tools.ietf.org/html/rfc6101 . 2011
  • 8Eric Rescorla.SSL and TLS:Designing and Building Secure Systems[]..2001
  • 9The secure shell (SSH)transport layer protocol. http://tools.ietf.org/html/rfc4253 . 2011
  • 10Martin Libicki.Cyberdeterrence and Cyberwar[]..2009

同被引文献17

引证文献3

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部