Skip to main content

Software Design for Network Monitoring System

  • Conference paper

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 308))

Abstract

This paper designs software for a new generation network monitoring system by analyzing the current major problems in network monitoring system. By realizing the functions of the system, this paper puts forward concrete implementation plans about automatic extraction of features recognition, automatic promotion of identification method and identification regulations, flexible broadband supervision, supporting cleanable flux purification, and the analysis of the performance of the network and crucial business.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Moore, A.W., Papagiannaki, K.: Toward the Accurate Identification of Network Applications. In: Dovrolis, C. (ed.) PAM 2005. LNCS, vol. 3431, pp. 41–54. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  2. Karagiannis, T., Broido, A., Faloutsos, M., et al.: Transport layer identification of P2P traffic. In: Proc of the 4th Internet Measurement Conference, Taormina, Italy, pp. 121–134 (2004)

    Google Scholar 

  3. Sen, S., Spatscheck, O., Wang, D : Accurate, scalable network identification of P2P traffic using application signatures. In: Proc. of WWW 2004, New York, pp. 512–521 (2004)

    Google Scholar 

  4. Kang, H.J., Kim, M.S., Homg, J.W.: Streamingmedia and multimedia conferencing traffic analysis using payload examination. ETRI Journal 26(3), 203–217 (2004)

    Article  Google Scholar 

  5. van der Merwe, J., Caceres, R., Chu, Y.-H., et al.: Mmdump: a tool formonitoring Internetmultimedia traffic. ACM Computer Comm. Review 30(4), 48–59 (2000)

    Article  Google Scholar 

  6. Moore, A.W., Zuev, D.: Internet traffic classification using Bayesian analysis techniques. In: Proc. of ACM SIGMETRICS 2005, pp. 50–60 (2005)

    Google Scholar 

  7. Zuev, D., Moore, A.W.: Traffic Classification Using a Statistical Approach. In: Dovrolis, C. (ed.) PAM 2005. LNCS, vol. 3431, pp. 321–324. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  8. Moore, A.W., Zuev, D.: Discriminators for use in flow-based classification. Intel Research, Cambridge (2004)

    Google Scholar 

  9. Postel, J.: Transmission Control Protocol. Information Sciences Institute, U. O. S. C. Transmission Control Protocol (September 1981)

    Google Scholar 

  10. Duffield, N.G., Lewis, J.T., O’Connell, N., Russell, R., Toomey, F.: Entropy of ATM traffic streams. IEEE Journal on Selected Areas in Communications 13(6), 981–990 (1995)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Gu, J., Xiao, B., Gu, Z. (2012). Software Design for Network Monitoring System. In: Liu, C., Wang, L., Yang, A. (eds) Information Computing and Applications. ICICA 2012. Communications in Computer and Information Science, vol 308. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34041-3_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-34041-3_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-34040-6

  • Online ISBN: 978-3-642-34041-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics