Distilling the Internet's Application Mix from Packet-Sampled Traffic
نویسندگان
چکیده
As the Internet continues to grow both in size and in terms of the volume of traffic it carries, more and more networks in the different parts of the world are relying on an increasing number of distinct ways to exchange traffic with one another. As a result, simple questions such as “What is the application mix in today’s Internet?” may produce non-informative simple answers unless they are refined by specifying the vantage point where the traffic is observed, the networks that are involved, or even the type of interconnection used. In this paper, we revisit the question of the application mix in today’s Internet and make two main contributions. First, we develop a methodology for classifying the application mix in packet-sampled traces collected at one of the largest IXPs in Europe and worldwide. We show that our method can classify close to 95% of the traffic by relying on a stateful classification approach that uses payload signatures, communication patterns, and port-based classification only as a fallback. Second, our results show that when viewed from this vantage point and aggregated over all the IXP’s public peering links, the Internet’s application mix is very similar to that reported in other recent studies that relied on different vantage points, peering links or classification methods. However, the observed aggregate application mix is by no means representative of the application mix seen on individual peering links. In fact, we show that the business type of the ASes that are responsible for much of the IXP’s total traffic has a strong influence on the application mix of their overall traffic and of the traffic seen on their major peering links.
منابع مشابه
Feature Extraction to Identify Network Traffic with Considering Packet Loss Effects
There are huge petitions of network traffic coming from various applications on Internet. In dealing with this volume of network traffic, network management plays a crucial rule. Traffic classification is a basic technique which is used by Internet service providers (ISP) to manage network resources and to guarantee Internet security. In addition, growing bandwidth usage, at one hand, and limit...
متن کاملToward Comprehensive Traffic Generation for Online IDS Evaluation
We describe a traffic generation framework for conducting online evaluations of network intrusion detection systems over a wide range of realistic conditions. The framework integrates both benign and malicious traffic, enabling generation of IP packet streams with diverse characteristics from the perspective of (i) packet content (both header and payload), (ii) packet mix (order of packets in s...
متن کاملAppmon: An Application for Accurate per Application Network Traffic Characterization
Accurate per-application network traffic characterization is becoming increasingly difficult in the face of emerging applications that use dynamically negotiated port numbers. At the same time, information about the contribution of different network applications and services to the traffic mix is highly demanded by network administrators for facilitating effective network management and traffic...
متن کاملTrajectory Sampling: White Paper Draft
TS implements consistent packet sampling. Conceptually, each packet traversing a measurement domain is sampled either on every link traversed, or on no link at all. Some highly compressed information on sampled packets are collected centrally in a collection system, which is then able to reconstruct the trajectory (path) of each sampled packet [5]. This set of sampled packet trajectories provid...
متن کاملTrajectory Sampling: White Paper
TS implements consistent packet sampling. Conceptually, each packet traversing a measurement domain is sampled either on every link traversed, or on no link at all. Some highly compressed information on sampled packets are collected centrally in a collection system, which is then able to reconstruct the trajectory (path) of each sampled packet [5]. This set of sampled packet trajectories provid...
متن کامل