This disclosure describes techniques for detection of duplicate data transfers over a backbone network based on time series correlation of the data traffic. Per techniques of this disclosure, a time series of data traffic is generated. Correlation of the time series of traffic flows from different servers is performed to determine duplicate data transfers. A correlation coefficient between different segments of traffic flow time series is determined. Segments of data traffic with a correlation coefficient that meet a threshold correlation coefficient (correlation coefficient close to 1) are identified as likely duplicate transfers. The described techniques can be utilized to detect duplicate data transfers within a backbone network. The tec...
Abstract—Anomaly extraction refers to automatically finding, in a large set of flows observed during...
The dominating Internet protocols, IP and TCP, allow some flexibility in implementation, including a...
Abstract—Anomaly extraction refers to automatically finding, in a large set of flows observed during...
This thesis describes methods for duplicate traffic detection in computer networks. At first, it ana...
The detection of anomalies in network traffic is an important task in today’s Internet. Among variou...
It is now widely accepted that packet network traffic exhibits long-range dependence (LRD), and this...
The measurement of wireless traffic through passive data collection is an in-creasingly used tactic ...
This article proposes a framework to analyse traffic-data processes on a long-haul backbone infrastr...
Traffic anomalies can create network congestion, so its prompt and accurate detection would allow ne...
Computer networks are becoming increasingly important in supporting business and everyday activities...
Computer networks are becoming increasingly important in supporting business and everyday activities...
With the rapid increase demand for data usage, Internet has become complex and harder to analyze. Ch...
Discovery of service nodes in flows is a challenging task,especially in large ISPs or campus network...
This article proposes a framework to analyse traffic-data processes on a long-haul backbone infrastr...
The paper proposes how to detect network traffic anomalies through packet header data. In this the s...
Abstract—Anomaly extraction refers to automatically finding, in a large set of flows observed during...
The dominating Internet protocols, IP and TCP, allow some flexibility in implementation, including a...
Abstract—Anomaly extraction refers to automatically finding, in a large set of flows observed during...
This thesis describes methods for duplicate traffic detection in computer networks. At first, it ana...
The detection of anomalies in network traffic is an important task in today’s Internet. Among variou...
It is now widely accepted that packet network traffic exhibits long-range dependence (LRD), and this...
The measurement of wireless traffic through passive data collection is an in-creasingly used tactic ...
This article proposes a framework to analyse traffic-data processes on a long-haul backbone infrastr...
Traffic anomalies can create network congestion, so its prompt and accurate detection would allow ne...
Computer networks are becoming increasingly important in supporting business and everyday activities...
Computer networks are becoming increasingly important in supporting business and everyday activities...
With the rapid increase demand for data usage, Internet has become complex and harder to analyze. Ch...
Discovery of service nodes in flows is a challenging task,especially in large ISPs or campus network...
This article proposes a framework to analyse traffic-data processes on a long-haul backbone infrastr...
The paper proposes how to detect network traffic anomalies through packet header data. In this the s...
Abstract—Anomaly extraction refers to automatically finding, in a large set of flows observed during...
The dominating Internet protocols, IP and TCP, allow some flexibility in implementation, including a...
Abstract—Anomaly extraction refers to automatically finding, in a large set of flows observed during...