Fernandes, 2017 - Google Patents
Internet traffic profilingFernandes, 2017
View PDF- Document ID
- 13407401723843341367
- Author
- Fernandes S
- Publication year
- Publication venue
- Performance Evaluation for Network Services, Systems and Protocols
External Links
Snippet
This chapter takes you on a journey on Internet traffic, from understanding its profile (ie, by modeling and analysis) to generating packets or flows (either real or synthetic), in diverse environments. Usual decision network engineers and researchers find when designing …
- 238000000034 method 0 abstract description 101
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/14—Arrangements for maintenance or administration or management of packet switching networks involving network analysis or design, e.g. simulation, network model or planning
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/50—Network service management, i.e. ensuring proper service fulfillment according to an agreement or contract between two parties, e.g. between an IT-provider and a customer
- H04L41/5003—Managing service level agreement [SLA] or interaction between SLA and quality of service [QoS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/02—Network-specific arrangements or communication protocols supporting networked applications involving the use of web-based technology, e.g. hyper text transfer protocol [HTTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/26—Monitoring arrangements; Testing arrangements
- H04L12/2602—Monitoring arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing packet switching networks
- H04L43/02—Arrangements for monitoring or testing packet switching networks involving a reduction of monitoring data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic regulation in packet switching networks
- H04L47/10—Flow control or congestion control
- H04L47/24—Flow control or congestion control depending on the type of traffic, e.g. priority or quality of service [QoS]
- H04L47/2441—Flow classification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Application independent communication protocol aspects or techniques in packet data networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11303659B2 (en) | Detecting inappropriate activity in the presence of unauthenticated API requests using artificial intelligence | |
| Hireche et al. | Deep data plane programming and AI for zero-trust self-driven networking in beyond 5G | |
| Mondal et al. | A dynamic network traffic classifier using supervised ML for a Docker-based SDN network | |
| Patil et al. | KS-DDoS: Kafka streams-based classification approach for DDoS attacks | |
| Jansen et al. | Privacy-preserving dynamic learning of tor network traffic | |
| Yanggratoke et al. | A service‐agnostic method for predicting service metrics in real time | |
| Fernandes | Performance evaluation for network services, systems and protocols | |
| Okafor et al. | Towards complex dynamic fog network orchestration using embedded neural switch | |
| Empl et al. | Digital twins for IoT security management | |
| Bahashwan et al. | HLD-DDoSDN: High and low-rates dataset-based DDoS attacks against SDN | |
| Borisenko et al. | DDoS attacks detection in cloud computing using data mining techniques | |
| Moreno-Sancho et al. | A data infrastructure for heterogeneous telemetry adaptation: application to Netflow-based cryptojacking detection | |
| Fernandes | Internet traffic profiling | |
| Shirsath et al. | Beyond the basics: An in-depth analysis and multidimensional survey of programmable switch in software-defined networking | |
| Yao et al. | Intelligent Internet of Things Networks | |
| Phanekham et al. | Throughput Measurements and Profile Analysis of Cloud Networks | |
| von der Assen | DDoSGrid 2.0: Integrating and Providing Visualizations for the European DDoS Clearing House | |
| Vieira et al. | A comparative analysis of machine learning algorithms for distributed intrusion detection in IoT networks | |
| Pacheco et al. | A wearable Machine Learning solution for Internet traffic classification in Satellite Communications | |
| Karunakaran et al. | A Secured Software Defined Network Architecture for Mini Net using POX Controller | |
| Großmann et al. | Emulation of Denial-of-Service Attacks for Software Defined Networks: Accessible on Commodity Hardware with Kathará | |
| EP4546137A1 (en) | Systems and methods for optimizing cloud architectures using artificial intelligence models | |
| Bleijerveld | A Scalable Recommendation System for Selective Retention of DDoS Traffic: Entropy-Based Network Traffic Analysis | |
| Yao | Intelligent Orchestration of High Performance, Scalable, and Correct Data Centres As a Network Service | |
| Vaqueiro | Intrusion Detection at the Architectural Level in Microservice Applications |