Skip to main content

Quality of Service Provision and Data Security in Communication Networks Based on Traffic Classification

  • Conference paper
  • First Online:
Book cover Advances in Ubiquitous Networking (UNet 2015)

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 366))

Included in the following conference series:

  • 1031 Accesses

Abstract

In this paper we present a new approach to admission control of new flows in communications networks. Initially, we introduce a traffic classification procedure based on a new construction approach of conservative multiplicative cascades, to ensure information security by blocking malicious attempts and creating priorities over well-intentioned traffic. The admission control process accepts or rejects then the request for a new call by evaluating the available bandwidth within a particular transmission interval for different pre-classified traffic types. The experimental investigation by simulation showed that the proposed method is capable of ensuring the efficient use of available network resources and at the same time providing consistent QoS provisions and data security for network traffic flows.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Newman, M.: Networks: An Introduction. Oxford University Press, Inc., NY (2010)

    Book  MATH  Google Scholar 

  2. Tanembaum, A.S.: Computer Networks, 4th edn. Campus (2003)

    Google Scholar 

  3. Stênico, J.W.G., Lee, L.L., Vieira, F.H.T.: Queuing Modeling Applied to Admission Control of Network Traffic Flows Considering Multifractal Characteristics. IEEE Latin America Transactions 11(2), 749–758 (2013)

    Article  Google Scholar 

  4. Stênico, J.W.G., Lee, L.L.: A new binomial conservative multiplicative cascade approach for network traffic modeling. In: 27th IEEE International Conference on Advanced Information Networking and Applications–IEEE AINA 2013, Barcelona, Spain, vol. 1, pp. 794–801, Mach 25–28 (2013)

    Google Scholar 

  5. Waymire, E.C., Willians, S.: Multiplicative Cascades: Dimension Spectra and Dependence. Journal of Fourier Analysis and Applications, Special Issue in Honour of Kahane, J.-P., pp. 589–609 (1995)

    Google Scholar 

  6. Falls, L.W.: The Beta Distribution: A Statistical Model for World Cloud Cover, pp. 1–6. NASA Tecnical Memorandum, TMX–64714, Alabama (1973)

    Google Scholar 

  7. Erramilli, A., Narayan, O., Neidhardt, A., Saniee, I.: Performance Impacts of Multi-Scaling in Wide Area TCP/IP Traffic. Proceedings Infocom. 1, 352–359 (2000)

    Google Scholar 

  8. http://ita.ee.lbl.gov/html/traces.html (retrieved: March, 2015)

  9. Jardosh, A., Ramachandran K.N., Almeroth, K.C., Belding, E.: CRAWDAD Data Set UCSB / IETF–2005 out 2005 (2005). http://crawdad.cs.dartmouth.edu/ucsb/ietf2005 (retrieved: March, 2015)

  10. Carela-Español, V., Barlet-Ros, P., Cabellos-Aparicio, A., Solé-Pareta, J.: Analysis of the Impact of Sampling on NetFlow Traffic Classification. Computer Networks 55, 1083–1099 (2011)

    Article  Google Scholar 

  11. Schulzrinne, H.: Internet Technical Notes and Resources (2008). http://www.cs.columbia.edu/~hgs/internet/traces.html (retrieved: March, 2015)

  12. UPC.: Traffic Classification at the Universitat Politècnica de Catalunya (UPC). http://loadshedding.ccaba.upc.edu/trafic_classification (retrieved: March, 2015)

  13. Mirkivic, J., Reiher, P., Prier, G., Michel, S., Li, J.: D-WARD: DDos Network Attack Recognition and Defense (2001). http://lever.cs.ucla.edu/ddos/traces (retrieved: March, 2015)

  14. L7-filter.: Application Layer Packet Classifier. http://l7-flter.sourceforge.net/

  15. Quinlan, J.R.: C4.5: Programs for Machine Learning. Morgan Kaufmann Publishers (1993)

    Google Scholar 

  16. Wongthavarawat, K., Ganz, A.: Packet scheduling for QoS support in IEEE 802.16 broadband wireless access systems. International Journal of Communication Systems 16(1), 81–96 (2003)

    Article  MATH  Google Scholar 

  17. Riedi, R.H., Crouse, M.S., Ribeiro, V.J., Baraniuk, R.G.: A Multifractal Wavelet Model with Application to Network Traffic. IEEE Transactions on Information Theory 45(3), 992–1018 (1999)

    Article  MathSciNet  MATH  Google Scholar 

  18. Dehghani, F., Movahhedinia, N., Khayyambashi, M.R., Kianian, S.: Real-time traffic classification based on statistical and payload content features. In: 2nd International Workshop on Intelligent Systems and Applications (ISA), pp. 1–4 (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jeferson Wilian de Godoy Stênico .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Science+Business Media Singapore

About this paper

Cite this paper

de Godoy Stênico, J.W., Ling, L.L. (2016). Quality of Service Provision and Data Security in Communication Networks Based on Traffic Classification. In: Sabir, E., Medromi, H., Sadik, M. (eds) Advances in Ubiquitous Networking. UNet 2015. Lecture Notes in Electrical Engineering, vol 366. Springer, Singapore. https://doi.org/10.1007/978-981-287-990-5_22

Download citation

  • DOI: https://doi.org/10.1007/978-981-287-990-5_22

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-287-989-9

  • Online ISBN: 978-981-287-990-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics