Digital signature to help network management using flow analysis

作者: Mario Lemes Proenca Jr , Gilberto Fernandes Jr , Luiz F Carvalho , Marcos VO de Assis , Joel JPC Rodrigues

DOI: 10.1002/NEM.1892

关键词:

摘要: Because of constant growth in proportion and complexity networks, flow analysis has become an indispensable tool for network management mechanisms. Through this resource, a traffic characterization, called digital signature segment using DSNSF, is accomplished. The models used purpose are the ant colony optimization metaheuristic, Holt-Winters forecasting method statistical procedure, principal component analysis. obtained DSNSF by each model compared with actual packets bits then subjected to specific evaluations order measure its accuracy. experimental results show that three methods could achieve good correlation indices low normalized mean square error values between curve real movement, indicating adaptability efficiency characterizing segment. Copyright © 2015 John Wiley & Sons, Ltd.

参考文章(34)
Giuseppe Aceto, Alessio Botta, Walter de Donato, Antonio Pescapè, Survey Cloud monitoring: A survey Computer Networks. ,vol. 57, pp. 2093- 2115 ,(2013) , 10.1016/J.COMNET.2013.04.001
Chirag Modi, Dhiren Patel, Bhavesh Borisaniya, Hiren Patel, Avi Patel, Muttukrishnan Rajarajan, A survey of intrusion detection techniques in Cloud Journal of Network and Computer Applications. ,vol. 36, pp. 42- 57 ,(2013) , 10.1016/J.JNCA.2012.05.003
Mario Lemes Proença, Camiel Coppelmans, Mauricio Bottoli, L. de Souza Mendes, Baseline to help with network management international conference on e-business and telecommunication networks. pp. 158- 166 ,(2006) , 10.1007/1-4020-4761-4_12
Davide Tammaro, Silvio Valenti, Dario Rossi, Antonio Pescapé, Exploiting packet-sampling measurements for traffic characterization and classification International Journal of Network Management. ,vol. 22, pp. 451- 476 ,(2012) , 10.1002/NEM.1802
M. Birattari, T. Stutzle, M. Dorigo, Ant Colony Optimization ,(2004)
Wenying Feng, Qinglei Zhang, Gongzhu Hu, Jimmy Xiangji Huang, Mining network data for intrusion detection through combining SVMs with ant colony networks Future Generation Computer Systems. ,vol. 37, pp. 127- 140 ,(2014) , 10.1016/J.FUTURE.2013.06.027
Tao Qin, Xiaohong Guan, Wei Li, Pinghui Wang, Qiuzhen Huang, Monitoring abnormal network traffic based on blind source separation approach Journal of Network and Computer Applications. ,vol. 34, pp. 1732- 1742 ,(2011) , 10.1016/J.JNCA.2011.06.006
Ranganai Chaparadza, UniFAFF: a unified framework for implementing autonomic fault management and failure detection for self-managing networks International Journal of Network Management. ,vol. 19, pp. 271- 290 ,(2009) , 10.1002/NEM.702
D. Chakraborty, A. Ashir, T. Suganuma, G. Mansfield Keeni, T. K. Roy, N. Shiratori, Self-similar and fractal nature of Internet traffic International Journal of Network Management. ,vol. 14, pp. 119- 129 ,(2004) , 10.1002/NEM.512
Peter J. Rousseeuw, Silhouettes: a graphical aid to the interpretation and validation of cluster analysis Journal of Computational and Applied Mathematics. ,vol. 20, pp. 53- 65 ,(1987) , 10.1016/0377-0427(87)90125-7