[go: up one dir, main page]

Fernandes, 2017 - Google Patents

Internet traffic profiling

Fernandes, 2017

View PDF
Document ID
13407401723843341367
Author
Fernandes S
Publication year
Publication venue
Performance Evaluation for Network Services, Systems and Protocols

External Links

Snippet

This chapter takes you on a journey on Internet traffic, from understanding its profile (ie, by modeling and analysis) to generating packets or flows (either real or synthetic), in diverse environments. Usual decision network engineers and researchers find when designing …
Continue reading at www.sce.carleton.ca (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance or administration or management of packet switching networks
    • H04L41/14Arrangements for maintenance or administration or management of packet switching networks involving network analysis or design, e.g. simulation, network model or planning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/10Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance or administration or management of packet switching networks
    • H04L41/50Network service management, i.e. ensuring proper service fulfillment according to an agreement or contract between two parties, e.g. between an IT-provider and a customer
    • H04L41/5003Managing service level agreement [SLA] or interaction between SLA and quality of service [QoS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/02Network-specific arrangements or communication protocols supporting networked applications involving the use of web-based technology, e.g. hyper text transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/26Monitoring arrangements; Testing arrangements
    • H04L12/2602Monitoring arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing packet switching networks
    • H04L43/02Arrangements for monitoring or testing packet switching networks involving a reduction of monitoring data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic regulation in packet switching networks
    • H04L47/10Flow control or congestion control
    • H04L47/24Flow control or congestion control depending on the type of traffic, e.g. priority or quality of service [QoS]
    • H04L47/2441Flow classification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F15/00Digital computers in general; Data processing equipment in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Application independent communication protocol aspects or techniques in packet data networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks

Similar Documents

Publication Publication Date Title
US11303659B2 (en) Detecting inappropriate activity in the presence of unauthenticated API requests using artificial intelligence
Hireche et al. Deep data plane programming and AI for zero-trust self-driven networking in beyond 5G
Mondal et al. A dynamic network traffic classifier using supervised ML for a Docker-based SDN network
Patil et al. KS-DDoS: Kafka streams-based classification approach for DDoS attacks
Jansen et al. Privacy-preserving dynamic learning of tor network traffic
Yanggratoke et al. A service‐agnostic method for predicting service metrics in real time
Fernandes Performance evaluation for network services, systems and protocols
Okafor et al. Towards complex dynamic fog network orchestration using embedded neural switch
Empl et al. Digital twins for IoT security management
Bahashwan et al. HLD-DDoSDN: High and low-rates dataset-based DDoS attacks against SDN
Borisenko et al. DDoS attacks detection in cloud computing using data mining techniques
Moreno-Sancho et al. A data infrastructure for heterogeneous telemetry adaptation: application to Netflow-based cryptojacking detection
Fernandes Internet traffic profiling
Shirsath et al. Beyond the basics: An in-depth analysis and multidimensional survey of programmable switch in software-defined networking
Yao et al. Intelligent Internet of Things Networks
Phanekham et al. Throughput Measurements and Profile Analysis of Cloud Networks
von der Assen DDoSGrid 2.0: Integrating and Providing Visualizations for the European DDoS Clearing House
Vieira et al. A comparative analysis of machine learning algorithms for distributed intrusion detection in IoT networks
Pacheco et al. A wearable Machine Learning solution for Internet traffic classification in Satellite Communications
Karunakaran et al. A Secured Software Defined Network Architecture for Mini Net using POX Controller
Großmann et al. Emulation of Denial-of-Service Attacks for Software Defined Networks: Accessible on Commodity Hardware with Kathará
EP4546137A1 (en) Systems and methods for optimizing cloud architectures using artificial intelligence models
Bleijerveld A Scalable Recommendation System for Selective Retention of DDoS Traffic: Entropy-Based Network Traffic Analysis
Yao Intelligent Orchestration of High Performance, Scalable, and Correct Data Centres As a Network Service
Vaqueiro Intrusion Detection at the Architectural Level in Microservice Applications