ANOVA Decision Tool for Determining the Best Estimation of a Large Scale IP Network Traffic Matrix Using ARIMA/GARCH Algorithm

Author(s):  
Slimane Mekaoui ◽  
Anis Boubekeur ◽  
Choukri Benhamed ◽  
Kamal Ghoumid
2021 ◽  
Vol 2 ◽  
pp. 46-56
Author(s):  
Dalal Aloraifan ◽  
Imtiaz Ahmad ◽  
Ebrahim Alrashed

2014 ◽  
Vol 11 (1) ◽  
pp. 309-320
Author(s):  
Hui Tian ◽  
Yingpeng Sang ◽  
Hong Shen ◽  
Chunyue Zhou

Traffic matrix is of great help in many network applications. However, it is very difficult to estimate the traffic matrix for a large-scale network. This is because the estimation problem from limited link measurements is highly underconstrained. We propose a simple probability model for a large-scale practical network. The probability model is then generalized to a general model by including random traffic data. Traffic matrix estimation is then conducted under these two models by two minimization methods. It is shown that the Normalized Root Mean Square Errors of these estimates under our model assumption are very small. For a large-scale network, the traffic matrix estimation methods also perform well. The comparison of two minimization methods shown in the simulation results complies with the analysis.


Author(s):  
Karan Shingare ◽  
Rohit Nandurkar ◽  
Prashant Shrivastav ◽  
Shailesh Bendale

As the world is moving toward newer technologies and to meet the requirements of the same adapting toward different network topology. SDN is such example of a network which solves many issues or limitations of a traditional TCP/IP network. As majority of workspace is moving towards SDN, many new vulnerabilities are also emerging, and to protect the network and systems on these networks, in this paper we discuss and propose a dataset which would be helpful in training an intrusion detection system over SDN which would also include the intrusion dataset for traditional TCP/IP network too. We generate this data over SDN topology by attacking the host system present in the network, then analyse the generated data using CICFlowmeter which would give us the desired dataset for intrusion detection.


Author(s):  
Seferin Mirtchev ◽  
Constandinos X. Mavromoustakis ◽  
Rossitza Goleva ◽  
Kiril Kassev ◽  
George Mastorakis

Sign in / Sign up

Export Citation Format

Share Document