Abstract
Traffic measurement has many important applications in capacity planning, accounting and billing, anomaly detection, service provision, etc. In the era of big network data, traffic measurement becomes a daunting task that requires tremendous resources. To keep up with the line speeds of modern routers, the measurement modules should be implemented in the limited on-chip cache memory, thereby minimizing the per-packet processing time. This book aims to develop new compact and fast online measurement methods that reduce big network data to measurement summaries orders-of-magnitude smaller than what the traditional methods can do. The new methods hold the promise of allowing routers to perform measurement on large network traffic in real time using small cache memory on network processors.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bar-yossef, Z., Jayram, T.S., Kumar, R., Sivakumar, D., Trevisan, L.: Luca: counting distinct elements in a data stream. In: Proceedings of RANDOM: Workshop on Randomization and Approximation (2002)
Cao, J., Jin, Y., Chen, A., Bu, T., Zhang, Z.: Identifying high cardinality internet hosts. In: Proceedings of IEEE INFOCOM (2009)
Cisco IOS NetFlow: Available at http://www.cisco.com/c/en/us/products/ios-nx-os-software/ios-netflow/index.html (2005)
Chen, S., Tang, Y.: Slowing down internet worms. In: Proceedings of IEEE ICDCS (2004)
Chen, A., Cao, J., Bu, T.: A simple and efficient estimation method for stream expression cardinalities. In: Proceedings of the 33rd International Conference on Very Large Data Bases, VLDB ’07, pp. 171–182 (2007)
Cisco: The Zettabyte EraTrends and Analysis (2015). Available at http://www.cisco.com/c/en/us/solutions/collateral/service-provider/visual-networking-index-vni/VNI_Hyperconnectivity_WP.html
Duffield, N., Lund, C., Thorup, M.: Estimating flow distributions from sampled flow statistics. In: Proceedings of ACM SIGCOMM (2003)
Durand, M., Flajolet, P.: Loglog counting of large cardinalities. In: ESA: European Symposia on Algorithms, pp. 605–617 (2003)
Estan, C., Varghese, G., Fish, M.: Bitmap algorithms for counting active flows on high-speed links. IEEE/ACM Trans. Netw. 14 (5), 925–937 (2006)
Flajolet, P., Martin, G.N.: Probabilistic counting algorithms for database applications. J. Comput. Syst. Sci. 31 (2), 182–209 (1985)
Flajolet, P., Fusy, E., Gandouet, O., Meunier., F.: HyperLogLog: the analysis of a near-optimal cardinality estimation algorithm. In: Proceedings of AOFA: International Conference on Analysis of Algorithms (2007)
Google Trends: Available at https://www.google.com/trends/
Hao, F., Kodialam, M., Lakshman, T.V.: ACCEL-RATE: a faster mechanism for memory efficient per-flow traffic estimation. In: Proceedings of ACM SIGMETRICS/Performance (2004)
Heule, S., Nunkesser, M., Hall, A.: HyperLogLog in practice: algorithmic engineering of a state-of-the-art cardinality estimation algorithm. In: Proceedings of EDBT (2013)
Kumar, A., Sung, M., Xu, J., Wang, J.: Data streaming algorithms for efficient and accurate estimation of flow size distribution. In: Proceedings of ACM SIGMETRICS (2004)
Kumar, A., Xu, J., Wang, J., Spatschek, O., Li, L.: Space-code bloom filter for efficient per-flow traffic measurement. In: Proceedings of IEEE INFOCOM (2004). IEEE JSAC 24 (12), 2327–2339 (2006)
Li, T., Chen, S., Ling, Y.: Fast and compact per-flow traffic measurement through randomized counter sharing. In: Proceedings of IEEE INFOCOM, pp. 1799–1807 (2011)
Li, T., Chen, S., Luo, W., Zhang, M., Qiao, Y.: Spreader classification based on optimal dynamic bit sharing. IEEE/ACM Trans. Netw. 21 (3), 817–830 (2013)
Lieven, P., Scheuermann, B.: High-speed per-flow traffic measurement with probabilistic multiplicity counting. In: Proceedings of IEEE INFOCOM, pp. 1–9 (2010). doi:10.1109/INFCOM.2010.5461921
Lu, Y., Montanari, A., Prabhakar, B., Dharmapurikar, S., Kabbani, A.: Counter Braids: a novel counter architecture for per-flow measurement. In: Proceedings of ACM SIGMETRICS (2008)
Mahajan, P., Bellovin, S.M., Floyd, S., Ioannidis, J., Paxson, V., Shenker, S.: Controlling high bandwidth aggregates in the network. Comput. Commun. Rev. 32 (3), 62–73 (2002)
Moore, D., Voelker, G., Savage, S.: Inferring internet denial of service activity. In: Proceedings of USENIX Security Symposium’ 2001 (2001)
Moore, D., Shannon, C., Voelker, G.M., Savage, S.: Internet quarantine: requirements for containing self-propagating code. In: Proceedings of IEEE INFOCOM (2003)
Moshref, M., Yu, M., Govindan, R., Vahdat, A.: Dream: dynamic resource allocation for software-defined measurement. In: Proceedings of ACM SIGCOMM, pp. 419–430 (2014)
Park, K., Lee, H.: On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets. In: Proceedings of ACM SIGCOMM’2001 (2001)
Plonka, D.: FlowScan: a network traffic flow reporting and visualization tool. In: Proceedings of USENIX LISA (2000)
Smith, G.: By the numbers: 80+ amazing google search statistics and facts (2015). Available at http://expandedramblings.com/index.php/by-the-numbers-a-gigantic-list-of-google-stats-and-facts/
Song, H., Hao, F., Kodialam, M., Lakshman, T.: IPv6 lookups using distributed and load balanced bloom filters for 100Gbps core router line cards. In: Proceedings of IEEE INFOCOM (2009)
Staniford, S., Hoagland, J., McAlerney, J.: Practical automated detection of stealthy portscans. J. Comput. Secur. 10, 105–136 (2002)
Staniford, S., Paxson, V., Weaver, N.: How to 0wn the internet in your spare time. In: Proceedings of USENIX Security Symposium (2002)
The CAIDA UCSD Anonymized 2013 Internet Traces - January 17: http://www.caida.org/data/passive/passive_2013_dataset.xml (2013)
Twitter Usage Statistics: Available at http://www.internetlivestats.com/twitter-statistics/ (2013)
Venkatataman, S., Song, D., Gibbons, P., Blum, A.: New streaming algorithms for fast detection of superspreaders. In: Proceedings of NDSS (2005)
Wang, H., Zhang, D., Shin, K.G.: SYN-dog: sniffing SYN Flooding Sources. In: Proceedings of 22nd International Conference on Distributed Computing Systems (ICDCS’02) (2002)
Whang, K.Y., Vander-Zanden, B.T., Taylor, H.M.: A linear-time probabilistic counting algorithm for database applications. ACM Trans. Database Syst. 15 (2), 208–229 (1990)
Yoon, M., Li, T., Chen, S., Peir, J.K.: Fit a spread estimator in small memory. In: Proceedings of IEEE INFOCOM (2009)
Zhao, Q., Xu, J., Kumar, A.: Detection of super sources and destinations in high-speed networks: algorithms, analysis and evaluation. IEEE JASC 24 (10), 1840–1852 (2006)
Zhao, Q., Xu, J., Kumar, A.: Detection of super sources and destinations in high-speed networks: algorithms, analysis and evaluation. IEEE JSAC 24 (10) (2006)
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this chapter
Cite this chapter
Chen, S., Chen, M., Xiao, Q. (2017). Introduction. In: Traffic Measurement for Big Network Data. Wireless Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-47340-6_1
Download citation
DOI: https://doi.org/10.1007/978-3-319-47340-6_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-47339-0
Online ISBN: 978-3-319-47340-6
eBook Packages: EngineeringEngineering (R0)