The length of measurement period to determine the application profile for traffic classification in the Internet

نویسندگان

  • Mika Ilvesmäki
  • Sampo Kaikkonen
چکیده

We discuss the aspect of measurement period length in the detection of dynamic application profiles in the future Internet solutions requiring automatic network based traffic differentiation. We base the analysis on a measurement-based method to form dynamic application profiles and observe the effect of the measurement period to the quantity and quality on the dynamic application profile. We see that the detected traffic profiles are of reasonable size and contain relevant applications. The results indicate that the measurement period has to be several hours in length and that the measurement process should be ongoing to ensure valid and stabilized application set.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Feature Extraction to Identify Network Traffic with Considering Packet Loss Effects

There are huge petitions of network traffic coming from various applications on Internet. In dealing with this volume of network traffic, network management plays a crucial rule. Traffic classification is a basic technique which is used by Internet service providers (ISP) to manage network resources and to guarantee Internet security. In addition, growing bandwidth usage, at one hand, and limit...

متن کامل

Optimal Choice of Random Variables in D-ITG Traffic Generating Tool using Evolutionary Algorithms

Impressive development of computer networks has been required precise evaluation of efficiency of these networks for users and especially internet service providers. Considering the extent of these networks, there has been numerous factors affecting their performance and thoroughly investigation of these networks needs evaluation of the effective parameters by using suitable tools. There are se...

متن کامل

F-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management

Distributed Denial of Service (DDoS) is a common attack in recent years that can deplete the bandwidth of victim nodes by flooding packets. Based on the type and quantity of traffic used for the attack and the exploited vulnerability of the target, DDoS attacks are grouped into three categories as Volumetric attacks, Protocol attacks and Application attacks. The volumetric attack, which the pro...

متن کامل

Application of Malmquist Index in Two-Stage DEA for Measurement of Productivity Growth

The purpose of this paper is to develop an output oriented methodology for calculating productivity growth by using Malmquist productivity index (MPI) and two different data envelopment analysis (DEA) views (optimistic and pessimistic) simultaneously, and apply it to five Iranian Commercial Banks over the four time period (2009-2013). Consequently, we have proposed a new approach called the dou...

متن کامل

Anomaly-based Web Attack Detection: The Application of Deep Neural Network Seq2Seq With Attention Mechanism

Today, the use of the Internet and Internet sites has been an integrated part of the people’s lives, and most activities and important data are in the Internet websites. Thus, attempts to intrude into these websites have grown exponentially. Intrusion detection systems (IDS) of web attacks are an approach to protect users. But, these systems are suffering from such drawbacks as low accuracy in ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001