Reliable Network Traffic Collection for Network Characterization and User Behavior
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2013, Vol 4, Issue 2
Abstract
This paper presents a reliable and complete traffic collection facility as a first and crucial step toward accurate traffic analysis for network characterization and user behavior. The key contribution is to produce an accurate, reliable and high fidelity traffic traces as the valuable source of information in the passive traffic ananlysis approach. In order to guarantee the traces reliability, we first detect the bottlenecks of the collection facility, and then propose different monitoring probes starting from the ethernet network interface and ending at the packet trace. The proposed facility can run without stop for long time instead of one-shot periods, therefore, it can be used to draw a complete picture of network traffic that fully characterize the network and user behavior. The laboratory experiments conclude that the system is highly reliable, stable and produces reliable traces attached with different statistics reports that come from the installed monitoring probes.
Authors and Affiliations
Ali Awad, Hanafy Ali, Heshasm Hamed
Map Reduce: A Survey Paper on Recent Expansion
A rapid growth of data in recent time, Industries and academia required an intelligent data analysis tool that would be helpful to satisfy the need to analysis a huge amount of data. MapReduce framework is basically desi...
Speech Recognition System based on Discrete Wave Atoms Transform Partial Noisy Environment
Automatic speech recognition is one of the most active research areas as it offers a dynamic platform for human-machine interaction. The robustness of speech recognition systems is often degraded in real time application...
Identification of Critical Node for the Efficient Performance in Manet
This paper considers a network where nodes are connected randomly and can fail at random times. The critical-node test detects nodes, whose failures are malicious behavior, disconnects or significantly degrades the...
Developing an Algorithm for Securing the Biometric Data Template in the Database
In the current technology advancement, biometric template provides a dependable solution to the problem of user verification in an identity control system. The template is saved in the database during the enrollment and...
Feed Forward Neural Network Based Eye Localization and Recognition Using Hough Transform
Eye detection is a pre-requisite stage for many applications such as face recognition, iris recognition, eye tracking, fatigue detection based on eye-blink count and eye-directed instruction control. As the location of...