scholarly journals Linguistic summarization of network traffic flows

Author(s):  
Federico Montesino Pouzols ◽  
Angel Barriga ◽  
Diego R. Lopez ◽  
Santiago Sanchez-Solano
Author(s):  
Anukool Lakhina ◽  
Konstantina Papagiannaki ◽  
Mark Crovella ◽  
Christophe Diot ◽  
Eric D. Kolaczyk ◽  
...  

2014 ◽  
Vol 2014 ◽  
pp. 1-17 ◽  
Author(s):  
Mirko Suznjevic ◽  
Jose Saldana ◽  
Maja Matijasevic ◽  
Julián Fernández-Navajas ◽  
José Ruiz-Mas

Many Massively Multiplayer Online Role-Playing Games (MMORPGs) use TCP flows for communication between the server and the game clients. The utilization of TCP, which was not initially designed for (soft) real-time services, has many implications for the competing traffic flows. In this paper we present a series of studies which explore the competition between MMORPG and other traffic flows. For that aim, we first extend a source-based traffic model, based on player’s activities during the day, to also incorporate the impact of the number of players sharing a server (server population) on network traffic. Based on real traffic traces, we statistically model the influence of the variation of the server’s player population on the network traffic, depending on the action categories (i.e., types of in-game player behaviour). Using the developed traffic model we prove that while server population only modifies specific action categories, this effect is significant enough to be observed on the overall traffic. We find that TCPVegasis a good option for competing flows in order not to throttle the MMORPG flows and that TCP SACK is more respectful with game flows than other TCP variants, namely,Tahoe, Reno,andNew Reno. Other tests show that MMORPG flows do not significantly reduce their sending window size when competing against UDP flows. Additionally, we study the effect of RTT unfairness between MMORPG flows, showing that it is less important than in the case of network-limited TCP flows.


2021 ◽  
Author(s):  
Shixu Liu ◽  
Hao Yan ◽  
Said M. Easa ◽  
Lidan Guo ◽  
Yingnuo Tang

This paper proposes a traffic-flow evolutionary model under a dual updating mechanism that describes the day-to-day (DTD) dynamics of traffic flow and travel cost. To illustrate the concept, a simple two-route network is considered. Based on the nonlinear dynamic theory, the equilibrium stability condition of the system is derived and the condition for the division between the bifurcation and chaotic states of the system is determined. The characteristics of the DTD dynamic evolution of network traffic flow are investigated using numerical experiments. The results show that the system is absolutely stable when the sensitivity of travelers toward the route cost parameter (θ) is equal to or less than 0.923. The bifurcation appears in the system when θ is larger than 0.923. For values of θ equal to or larger than 4.402, the chaos appears in the evolution of the system. The results also show that with the appearance of chaos, the boundary and interior crises begin to appear in the system when θ is larger than 6.773 and 10.403, respectively. The evolution of network traffic flow is always stable when the proportion of travelers who do not change the route is 84% or greater.


Author(s):  
Ramesh Paudel ◽  
Lauren Tharp ◽  
Dulce Kaiser ◽  
William Eberle ◽  
Gerald Gannod

Network protocol analyzers such asWireshark are valuable for analyzing network traffic but pose a challenge in that it can be difficult to determine which behaviors are out of the ordinary due to the volume of data that must be analyzed. Network anomaly detection systems can provide vital insights to security analysts to supplement protocol analyzers, but this feedback can be difficult to interpret due to the complexity of the algorithms used and the lack of context to determine the reasoning for which an event was labeled as anomalous. We present an approach for visualizing anomalies using a graph-based anomaly detection methodology that aims to provide visual context to network traffic. We demonstrate the approach using network traffic flows as an approach for aiding in the investigation and triage of anomalous network events. The simplicity of a visual representation supports fast analysis of anomalous traffic to identify true positives from false positives and prevent further potential damage.


2019 ◽  
Vol 9 (10) ◽  
pp. 2054 ◽  
Author(s):  
Wenhao Yu ◽  
Menglin Guan ◽  
Zhanlong Chen

The transport system is a critical component of the urban environment in terms of its connectivity, aggregation, and dynamic functions. The transport system can be considered a complex system due to the massive traffic flows generated by the spatial interactions between land uses. Benefiting from the recent development of location-aware sensing technologies, large volumes of traffic flow data (e.g., taxi trajectory data) have been increasingly collected in spatial databases, which provides new opportunities to interpret transport systems in cities. This paper aims to analyze network traffic flow from the perspective of the properties of spatial connectivity, spatial aggregation, and spatial dynamics. To this end, we propose a three level framework to mine intra-city vehicle trajectory data. More specifically, the first step was to construct the network traffic flow, with nodes and edges representing the partitioned regions and associated traffic flows, respectively. We then detected community structures of network traffic flow based on their structural and traffic volume properties. Finally, we analyzed the variations of those communities across time for the dynamic transport system. Through experiments in Beijing city, we found that the method is effective in interpreting the mechanisms of urban space, and can provide references for administrative divisions.


IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 119904-119916 ◽  
Author(s):  
Yong Zhang ◽  
Xu Chen ◽  
Da Guo ◽  
Mei Song ◽  
Yinglei Teng ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document