Quality of Service Provision and Data Security in Communication Networks Based on Traffic Classification
In this paper we present a new approach to admission control of new flows in communications networks. Initially, we introduce a traffic classification procedure based on a new construction approach of conservative multiplicative cascades, to ensure information security by blocking malicious attempts and creating priorities over well-intentioned traffic. The admission control process accepts or rejects then the request for a new call by evaluating the available bandwidth within a particular transmission interval for different pre-classified traffic types. The experimental investigation by simulation showed that the proposed method is capable of ensuring the efficient use of available network resources and at the same time providing consistent QoS provisions and data security for network traffic flows.
KeywordsMultiplicative cascade Traffic classification Admission control
Unable to display preview. Download preview PDF.
- 2.Tanembaum, A.S.: Computer Networks, 4th edn. Campus (2003)Google Scholar
- 4.Stênico, J.W.G., Lee, L.L.: A new binomial conservative multiplicative cascade approach for network traffic modeling. In: 27th IEEE International Conference on Advanced Information Networking and Applications–IEEE AINA 2013, Barcelona, Spain, vol. 1, pp. 794–801, Mach 25–28 (2013)Google Scholar
- 5.Waymire, E.C., Willians, S.: Multiplicative Cascades: Dimension Spectra and Dependence. Journal of Fourier Analysis and Applications, Special Issue in Honour of Kahane, J.-P., pp. 589–609 (1995)Google Scholar
- 6.Falls, L.W.: The Beta Distribution: A Statistical Model for World Cloud Cover, pp. 1–6. NASA Tecnical Memorandum, TMX–64714, Alabama (1973)Google Scholar
- 7.Erramilli, A., Narayan, O., Neidhardt, A., Saniee, I.: Performance Impacts of Multi-Scaling in Wide Area TCP/IP Traffic. Proceedings Infocom. 1, 352–359 (2000)Google Scholar
- 8.http://ita.ee.lbl.gov/html/traces.html (retrieved: March, 2015)
- 9.Jardosh, A., Ramachandran K.N., Almeroth, K.C., Belding, E.: CRAWDAD Data Set UCSB / IETF–2005 out 2005 (2005). http://crawdad.cs.dartmouth.edu/ucsb/ietf2005 (retrieved: March, 2015)
- 11.Schulzrinne, H.: Internet Technical Notes and Resources (2008). http://www.cs.columbia.edu/~hgs/internet/traces.html (retrieved: March, 2015)
- 12.UPC.: Traffic Classification at the Universitat Politècnica de Catalunya (UPC). http://loadshedding.ccaba.upc.edu/trafic_classification (retrieved: March, 2015)
- 13.Mirkivic, J., Reiher, P., Prier, G., Michel, S., Li, J.: D-WARD: DDos Network Attack Recognition and Defense (2001). http://lever.cs.ucla.edu/ddos/traces (retrieved: March, 2015)
- 14.L7-filter.: Application Layer Packet Classifier. http://l7-flter.sourceforge.net/
- 15.Quinlan, J.R.: C4.5: Programs for Machine Learning. Morgan Kaufmann Publishers (1993)Google Scholar
- 18.Dehghani, F., Movahhedinia, N., Khayyambashi, M.R., Kianian, S.: Real-time traffic classification based on statistical and payload content features. In: 2nd International Workshop on Intelligent Systems and Applications (ISA), pp. 1–4 (2010)Google Scholar
Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 2.5 International License (http://creativecommons.org/licenses/by-nc/2.5/), which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.
The images or other third party material in this chapter are included in the chapter's Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the chapter's Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder.