Many networking and security applications can benefit from exact detection of large flows over arbitrary windows (i.e. any possible time window). Existing large flow detectors that only check the average throughput over certain time period cannot detect bursty flows and are therefore easily fooled by attackers. However, no scalable approaches pro-vide exact classification in one pass. To address this chal-lenge, we consider a new model of exactness outside an ambi-guity region, which is defined to be a range of bandwidths be-low a high-bandwidth threshold and above a low-bandwidth threshold. Given this new model, we propose a deterministic algorithm, EARDet, that detects all large flows (including bursty flows) and avoids false accusation a...
The spread of 1-10Gbps technology has in recent years paved the way to a flourishing landscape of ne...
Network based attacks are the major threat to security on the Internet. The volume of traffic and th...
Encrypted traffic accounts for 95% of the total traffic in the backbone network environment with Tbp...
Being able to exactly detect large network flows under an arbitrary time win- dow model is expected ...
Many attacks that threaten service providers and legitimate users are anomalous behaviors out of spe...
In order to provide high quality network management, traffic scheduling and network security, we nee...
While the number of concurrent flows passing through backbone routers is large (more than 250,000), ...
We propose in this paper an on-line algorithm based on Bloom filters for identifying large flows in ...
In this paper we address the problem of counting the number of distinct header patterns (flows) seen...
In this paper we present a family of algorithms that address the problem of counting the number of d...
Knowing the distribution of the sizes of traffic flows passing through a network link helps a networ...
Per-flow traffic measurement is critical for usage accounting, traffic engineering, and anomaly dete...
Accurate network traffic measurement is required for accounting, bandwidth provisioning and detectin...
International audienceIn order to control and manage highly aggregated Internet traffic flows effici...
The network system usually falls into the complexity of preventing the real time anomalies in the cr...
The spread of 1-10Gbps technology has in recent years paved the way to a flourishing landscape of ne...
Network based attacks are the major threat to security on the Internet. The volume of traffic and th...
Encrypted traffic accounts for 95% of the total traffic in the backbone network environment with Tbp...
Being able to exactly detect large network flows under an arbitrary time win- dow model is expected ...
Many attacks that threaten service providers and legitimate users are anomalous behaviors out of spe...
In order to provide high quality network management, traffic scheduling and network security, we nee...
While the number of concurrent flows passing through backbone routers is large (more than 250,000), ...
We propose in this paper an on-line algorithm based on Bloom filters for identifying large flows in ...
In this paper we address the problem of counting the number of distinct header patterns (flows) seen...
In this paper we present a family of algorithms that address the problem of counting the number of d...
Knowing the distribution of the sizes of traffic flows passing through a network link helps a networ...
Per-flow traffic measurement is critical for usage accounting, traffic engineering, and anomaly dete...
Accurate network traffic measurement is required for accounting, bandwidth provisioning and detectin...
International audienceIn order to control and manage highly aggregated Internet traffic flows effici...
The network system usually falls into the complexity of preventing the real time anomalies in the cr...
The spread of 1-10Gbps technology has in recent years paved the way to a flourishing landscape of ne...
Network based attacks are the major threat to security on the Internet. The volume of traffic and th...
Encrypted traffic accounts for 95% of the total traffic in the backbone network environment with Tbp...