Skip to main content

Traffic Collection and Analysis System

  • Conference paper
  • First Online:
Social Computing (ICYCSEE 2016)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 624))

Abstract

This paper designs and implements a network traffic collection and analysis system (NTCA). Network traffic is collected from multiple clients. According to the offline traffic analysis, network flows are analyzed and annotated with application protocol. At the same time, the results are stored in the system. NTCA also provides a visual interface to simplify the configuration process. With good flexibility and scalability, NTCA can be extended to a network traffic classification system, which is crucial to the research of network security technology.

This research is partly supported by the Ministry of Education’s Humanities and Social Science Project No. 11YJC740048, Scientific planning issues of education in Heilongjiang Province No. GBC1211062, research fund for the program of new century excellent talents in Heilongjiang provincial university No. 1155-ncet-008 and the National Natural Science Foundation of China under grant No. 60903083, 61502123.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Moore, A., Zuev, D., Crogan, M.: Discriminators for use in flow-based classification. Queen Mary and Westfield College, Department of Computer Science (2005)

    Google Scholar 

  2. Moore, A.W., Papagiannaki, K.: Toward the accurate identification of network applications. In: Dovrolis, C. (ed.) PAM 2005. LNCS, vol. 3431, pp. 41–54. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  3. Sen, S., Spatscheck O., Wang D.: Accurate, scalable in-network identification of p2p traffic using application signatures. In: Proceedings of the 13th International Conference on World Wide Web. ACM, pp. 512–521 (2004)

    Google Scholar 

  4. Gringoli, F., Salgarelli, L., Dusi, M., et al.: Gt: picking up the truth from the ground for internet traffic. ACM SIGCOMM Comput. Commun. Rev. 39(5), 12–18 (2009)

    Article  Google Scholar 

  5. Keys, K., et al.: The architecture of CoralReef: an internet traffic monitoring software suite. In: PAM (2001)

    Google Scholar 

  6. Moore, A.W., Zuev, D.: Internet traffic classification using bayesian analysis techniques. ACM SIGMETRICS Perform. Eval. Rev. 33(1), 50–60 (2005). ACM

    Article  Google Scholar 

  7. Kim, H., Claffy, K.C., Fomenkov, M., et al.: Internet traffic classification demystified: myths, caveats, and the best practices. In: Proceedings of the 2008 ACM CoNEXT Conference. ACM, p. 11 (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guanglu Sun .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Science+Business Media Singapore

About this paper

Cite this paper

Liu, J., Wen, H., Hou, X., Sun, G., Zhu, S. (2016). Traffic Collection and Analysis System. In: Che, W., et al. Social Computing. ICYCSEE 2016. Communications in Computer and Information Science, vol 624. Springer, Singapore. https://doi.org/10.1007/978-981-10-2098-8_28

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-2098-8_28

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-2097-1

  • Online ISBN: 978-981-10-2098-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics