Encrypted traffic accounts for 95% of the total traffic in the backbone network environment with Tbps bandwidth. As network traffic becomes more and more encrypted and link rates increase in modern networks, the measurement of encrypted traffic relies more on collecting and analyzing massive network traffic data that can be separated from the support of high-speed network traffic measurement technology. Finding top-k elephant flows is a critical task with many applications in congestion control, anomaly detection, and traffic engineering. Owing to this, designing accurate and fast algorithms for online identification of elephant flows becomes more and more challenging. Existing methods either use large-size counters, i.e., 20 bit, to preven...
Currently, the widespread of real-time applications such as VoIP and videos-based applications requi...
International audienceThe paper deals with the problem of catching the elephants in the Internet tra...
A recurring task in security monitoring/anomaly detection applications consists in finding the so-ca...
In order to provide high quality network management, traffic scheduling and network security, we nee...
While the number of concurrent flows passing through backbone routers is large (more than 250,000), ...
Per-flow traffic measurement is critical for usage accounting, traffic engineering, and anomaly dete...
We propose in this paper an on-line algorithm based on Bloom filters for identifying large flows in ...
The ability to detect elephant flows in the forwarding device itself, i.e., a switch, facilitates th...
Software Defined Networking (SDN) has proved its importance as it allows users to create a Virtual n...
Knowing the distribution of the sizes of traffic flows passing through a network link helps a networ...
This paper presents an FPGA-friendly approach to tracking elephant flows in network traffic. Our app...
In this paper we address the problem of counting the number of distinct header patterns (flows) seen...
Traffic on the Internet today is routed on the shortest path to the destination. This is considered ...
Reliably tracking large network flows in order to determine so-called elephant flows, also known as ...
In this paper we present a family of algorithms that address the problem of counting the number of d...
Currently, the widespread of real-time applications such as VoIP and videos-based applications requi...
International audienceThe paper deals with the problem of catching the elephants in the Internet tra...
A recurring task in security monitoring/anomaly detection applications consists in finding the so-ca...
In order to provide high quality network management, traffic scheduling and network security, we nee...
While the number of concurrent flows passing through backbone routers is large (more than 250,000), ...
Per-flow traffic measurement is critical for usage accounting, traffic engineering, and anomaly dete...
We propose in this paper an on-line algorithm based on Bloom filters for identifying large flows in ...
The ability to detect elephant flows in the forwarding device itself, i.e., a switch, facilitates th...
Software Defined Networking (SDN) has proved its importance as it allows users to create a Virtual n...
Knowing the distribution of the sizes of traffic flows passing through a network link helps a networ...
This paper presents an FPGA-friendly approach to tracking elephant flows in network traffic. Our app...
In this paper we address the problem of counting the number of distinct header patterns (flows) seen...
Traffic on the Internet today is routed on the shortest path to the destination. This is considered ...
Reliably tracking large network flows in order to determine so-called elephant flows, also known as ...
In this paper we present a family of algorithms that address the problem of counting the number of d...
Currently, the widespread of real-time applications such as VoIP and videos-based applications requi...
International audienceThe paper deals with the problem of catching the elephants in the Internet tra...
A recurring task in security monitoring/anomaly detection applications consists in finding the so-ca...