Proceedings of the Joint International Conference on Measurement and Modeling of Computer Systems 2006
DOI: 10.1145/1140277.1140295
|View full text |Cite
|
Sign up to set email alerts
|

Data streaming algorithms for estimating entropy of network traffic

Abstract: Using entropy of traffic distributions has been shown to aid a wide variety of network monitoring applications such as anomaly detection, clustering to reveal interesting patterns, and traffic classification. However, realizing this potential benefit in practice requires accurate algorithms that can operate on high-speed links, with low CPU and memory requirements. Estimating the entropy in a streaming model to enable such fine-grained traffic analysis has been a challenging problem. We give lower bounds for t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
36
0

Year Published

2009
2009
2021
2021

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 77 publications
(36 citation statements)
references
References 30 publications
0
36
0
Order By: Relevance
“…While entropy measures have roots in thermodynamics, the use of entropy traces back to the early and influential work of Claude Shannon (1948Shannon ( , 1951). Shannon's work has proven important to a number of fields including cryptography, machine learning and artificial intelligence (Nigam et al 1999;Lall et al 2006;Bose 2002;Ganapathi et al 2012). In addition, entropy has enjoyed appeal in other domains where information processing is relevant including physics, statistics, economics, as well as many other related disciplines (Jaynes 1957;Csiszar 1991;Golan et al 1997;Soofi 2000;Schennach 2005;Tang et al 2008).…”
Section: Word Entropymentioning
confidence: 99%
“…While entropy measures have roots in thermodynamics, the use of entropy traces back to the early and influential work of Claude Shannon (1948Shannon ( , 1951). Shannon's work has proven important to a number of fields including cryptography, machine learning and artificial intelligence (Nigam et al 1999;Lall et al 2006;Bose 2002;Ganapathi et al 2012). In addition, entropy has enjoyed appeal in other domains where information processing is relevant including physics, statistics, economics, as well as many other related disciplines (Jaynes 1957;Csiszar 1991;Golan et al 1997;Soofi 2000;Schennach 2005;Tang et al 2008).…”
Section: Word Entropymentioning
confidence: 99%
“…EBA has showed three significant benefits in [8]: increased detection sensitivity, additional diagnostic information, and useful measure between traffic groups. EBA become a popular approach against DDoS attack.…”
Section: A Ddos Attack Detection Researchesmentioning
confidence: 99%
“…EBAs are introduced to enhance the performance of the ABA in [6,8,10]. However, the EBAs show a disadvantage in terms of time of computing entropy values.…”
Section: A Fast Entropy Approachmentioning
confidence: 99%
“…In Iustitia, we use a (δ, ǫ)-approximation algorithm to estimate S k ≡ i m ik log m ik in Formula (1). This algorithm is proposed for estimating the entropy of data streams by Lall et al in [12]. The basic idea is to use frequency moments estimation techniques [3].…”
Section: Overviewmentioning
confidence: 99%