An Elephant Flow Detection Method Based on Machine Learning

  • Kaihao Lou
  • Yongjian Yang
  • Chuncai WangEmail author
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11910)


Software-Defined Networking (SDN) is regarded as the next generation network. Current network is difficult to be configured and managed, and SDN is proposed to change this situation, which makes it attract a lot of attention of the academia and industry. The detection of Elephant Flow is an important service of SDN, based on which we can achieve the management of the network traffic and implement services such as the load balancing of traffic, congestion avoidance and so on. This paper focuses on the iterative method to detect Elephant Flow. We propose a method which uses the random forest to learn the arguments produced in the iterative detection and to improve the accuracy and speed of the detection. The experiments show that our method can efficiently improve the accuracy and speed of the detection compared to other methods.


Software-Defined Networking Elephant flow detection Machine learning Random forest 


  1. 1.
    Akyildiz, I.F., Lee, A., Wang, P., et al.: A roadmap for traffic engineering in SDN-OpenFlow networks. Comput. Netw. 71, 1–30 (2014)CrossRefGoogle Scholar
  2. 2.
    Thottan, M., Ji, C.: Anomaly detection in IP networks. IEEE Trans. Signal Process. 51(8), 2191–2204 (2003) CrossRefGoogle Scholar
  3. 3.
    Jose, L., Yu, M., Rexford, J.: Online measurement of large traffic aggregates on commodity switches. In: Hot Topics in Management of Internet, Cloud, and Enterprise Networks and Services. USENIX Association (2011)Google Scholar
  4. 4.
    Qiu, H., Noura, H., Qiu, M., et al.: A user-centric data protection method for cloud storage based on invertible DWT. IEEE Trans. Cloud Comput. 1 (2019)Google Scholar
  5. 5.
    Gai, K., Qiu, M., Zhao, H., et al.: Dynamic energy-aware cloudlet-based mobile cloud computing model for green computing. J. Netw. Comput. Appl. 59(C), 46–54 (2016)CrossRefGoogle Scholar
  6. 6.
    Gai, K., Qiu, M., Zhao, H.: Energy-aware task assignment for mobile cyber-enabled applications in heterogeneous cloud computing. J. Parallel Distrib. Comput. S0743731517302319 (2017)Google Scholar
  7. 7.
    Gai, K., Xu, K., Lu, Z., et al.: Fusion of cognitive wireless networks and edge computing. IEEE Wirel. Commun. 26(3), 69–75 (2019)CrossRefGoogle Scholar
  8. 8.
    Alizadeh, M., Edsall, T., Dharmapurikar, S., et al.: CONGA: distributed congestion-aware load balancing for datacenters. ACM SIGCOMM Comput. Commun. Rev. 44(4), 503–514 (2014)CrossRefGoogle Scholar
  9. 9.
    Alizadeh, M., Yang, S., Sharif, M., et al.: pFabric: minimal near-optimal datacenter transport. ACM SIGCOMM Comput. Commun. Rev. 43(4), 435–446 (2013)CrossRefGoogle Scholar
  10. 10.
    Benson, T., Anand, A., Akella, A., et al.: MicroTE: fine grained traffic engineering for data centers. In: Proceedings of the Seventh COnference on Emerging Networking EXperiments and Technologies, p. 8. ACM (2011)Google Scholar
  11. 11.
    García-Teodoro, P., Díaz-Verdejo, J., Maciá-Fernández, G., et al.: Anomaly-based network intrusion detection: techniques, systems and challenges. Comput. Secur. 28(1–2), 18–28 (2009)CrossRefGoogle Scholar
  12. 12.
    Kabbani, A., Alizadeh, M., Yasuda, M., et al.: AF-QCN: approximate fairness with quantized congestion notification for multi-tenanted data centers. In: 2010 18th IEEE Symposium on High Performance Interconnects, pp. 58–65, 2191–2204. IEEE (2010)Google Scholar
  13. 13.
    Duffield, N.: Sampling for passive internet measurement: a review. Stat. Sci. 19(3), 472–498, 2191–2204 (2004)MathSciNetCrossRefGoogle Scholar
  14. 14.
    Cormode, G., Muthukrishnan, S.: An improved data stream summary: the count-min sketch and its applications. J. Algorithms 55(1), 58–75 (2005)MathSciNetCrossRefGoogle Scholar
  15. 15.
    Moshref, M., Yu, M., Govindan, R., et al.: DREAM: dynamic resource allocation for software-defined measurement. ACM SIGCOMM Comput. Commun. Rev. 44(4), 419–430 (2015)CrossRefGoogle Scholar
  16. 16.
    The caida ucsd anonymized internet traces 2015[EB/OL], 06 April 2019.

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Department of Computer Science and TechnologyJilin UniversityChangchunChina
  2. 2.Changchun Polytechnic UniversityChangchunChina

Personalised recommendations