Abstract
As network traffic increases, the problems associated with monitoring and analyzing the traffic on high speed networks become increasingly difficult. In this paper, we introduce a new conceptual framework based on sets of IP addresses, for coming to grips with this problem. The analytical techniques are described and illustrated with examples drawn from a dataset collected from a large operational network.
The mantra ”Sex, Drugs, and Rock and Roll” enjoyed currency in the 1960s. To the ears of an older generation, Rock and Roll was just a particularly unpleasant form of noise. Since the general theme of this paper is separating signal from noise in network data, the title is not too strained. This material is based upon work partially supported by the National Science Foundation under Grant No. 0326472. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation. This work is also supported by the Army Research Office through grant number DAAD19-02-1-0389 (”Perpetually Available and Secure Information Systems”) to CyLab at Carnegie Mellon University
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Fullmer, M., Romig, S.: The OSU flow-tools package and Cisco NetFlow logs. In: LISA XIV, New Orleans, pp. 291–303 (2000)
Tukey, J.W.: Exploratory Data Analysis. Addison-Wesley, Reading (1977)
Bloom, B.: Space/time trade-offs in hash coding with allowable errors. Communications of ACM 13, 422–426 (1970)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
McHugh, J. (2004). Sets, Bags, and Rock and Roll. In: Samarati, P., Ryan, P., Gollmann, D., Molva, R. (eds) Computer Security – ESORICS 2004. ESORICS 2004. Lecture Notes in Computer Science, vol 3193. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30108-0_25
Download citation
DOI: https://doi.org/10.1007/978-3-540-30108-0_25
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-22987-2
Online ISBN: 978-3-540-30108-0
eBook Packages: Springer Book Archive