ExtendedSketch: Fusing Network Traffic for Super Host Identification With a Memory Efficient Sketch
نویسندگان
چکیده
Super host refers to the that has a high cardinality or exhibits big change in network. Facing big-volume network traffic, sketches have been widely applied identify super hosts an efficient and accurate way. However, most cannot flexibly balance memory usage accuracy estimation. Setting inappropriate counter size for sketch could either lead inaccurate estimation cause waste. In order solve this issue, we propose novel extensible reversible sketch, named ExtendedSketch, achieve identification with efficiency. The core idea of ExtendedSketch is monitor low-cardinality small-sized counters while dynamically extending when monitoring high-cardinality by applying adaptive extension strategy. Such strategy can adaptively increase according traffic status at runtime, which not only ensures but also avoids unnecessary consumption. We perform theoretical analysis conduct series experimental evaluations on based real world traffic. Experimental results show under same usage, compared state-of-the-art, achieves $1.4{ \sim }7.5$ times smaller error rate estimating notation="LaTeX">$1.9{ }26.7$ better notation="LaTeX">$95 {\sim }2^{15}$ faster speed abnormal address reconstruction. Its advance efficiency demonstrates practical significance identification.
منابع مشابه
Behavioral Analysis of Traffic Flow for an Effective Network Traffic Identification
Fast and accurate network traffic identification is becoming essential for network management, high quality of service control and early detection of network traffic abnormalities. Techniques based on statistical features of packet flows have recently become popular for network classification due to the limitations of traditional port and payload based methods. In this paper, we propose a metho...
متن کاملSketch-based Network-wide Traffic Anomaly Detection
Internet has become an essential part of the daily life for billions of users worldwide, who are using a large variety of network services and applications everyday. However, there have been serious security problems and network failures that are hard to resolve, for example, Botnet attacks, polymorphic worm/virus spreading, DDoS, and flash crowds. To address many of these problems, we need to ...
متن کاملProgrammable Host-Network Traffic Management
Data-center administrators perform traffic-management tasks (e.g., performance monitoring, server load balancing, and traffic engineering) to optimize network performance for diverse applications. Increasingly, traffic-management functionality is moving from the switches to the end hosts, which have more computational resources and better visibility into application behavior. However, traffic m...
متن کاملA computationally efficient method for online identification of traffic incidents and network equipment failures
Despite the vast wealth of traffic data available, currently there is only limited integration, analysis and utilisation of data in the transport domain. Yet, accurate congestion and incident detection is vital for traffic network operators to allow them to mitigate the cost of traffic incidents. Recurrent (cyclical) traffic congestion tends to be managed using timetabled control measures or th...
متن کاملHolistic Network Defense: Fusing Host and Network Features for Attack Classification
Current defensive systems focus primarily on network data, and are plagued by a high false positive rate and/or duplicate alerts with no ranking of importance. This work presents a hybrid network-host monitoring strategy, fusing data from both the network and the host to recognize malware infections. This research seeks to categorize systems into one of three classes: Normal, Scanning, and Infe...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Dependable and Secure Computing
سال: 2022
ISSN: ['1941-0018', '1545-5971', '2160-9209']
DOI: https://doi.org/10.1109/tdsc.2021.3111328