2015
DOI: 10.1002/nem.1892
|View full text |Cite
|
Sign up to set email alerts
|

Digital signature to help network management using flow analysis

Abstract: Summary Because of constant growth in proportion and complexity of networks, flow analysis has become an indispensable tool for network management mechanisms. Through this resource, a traffic characterization, called digital signature of network segment using flow analysis (DSNSF), is accomplished. The models used for this purpose are the ant colony optimization metaheuristic, the Holt–Winters forecasting method and the statistical procedure, principal component analysis. The obtained DSNSF by each model is co… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 38 publications
(16 reference statements)
0
4
0
Order By: Relevance
“…These models are suitable if the time series change suddenly, as happens with cloud computing traffic. In this case, an anomaly may be easily diluted inside the time window without compromising the prediction in whole . Moreover, after using DyWiSA with the α optimization, all predictor models have decreased the time and the workload to compute the prediction of the data.…”
Section: Evaluation and Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…These models are suitable if the time series change suddenly, as happens with cloud computing traffic. In this case, an anomaly may be easily diluted inside the time window without compromising the prediction in whole . Moreover, after using DyWiSA with the α optimization, all predictor models have decreased the time and the workload to compute the prediction of the data.…”
Section: Evaluation and Discussionmentioning
confidence: 99%
“…However, predicting network traffic is becoming a more complex task, specially with the surge in traffic that is due to the permanent connectivity of individuals and machines to the Internet . This challenge is even greater in cloud computing because its traffic may suffer sudden changes and the elastic and scalable nature of cloud environments may be easily confused with traffic anomalies, hampering its forecast . In addition, traditional tools for predicting data traffic usually take into account large historical data, therefore being classified as long‐range dependence (LRD) approaches.…”
Section: Introductionmentioning
confidence: 99%
“…Apart from identifying the significant behavior of the hosts in a network, there has already been an effort to identify a significant behavior of the whole segments in a network. Proenca et al create the digital signatures of the network segment using flow analysis in [27]. The authors compare the following methods' performance to create the signature of a network: ant colony algorithm, Holt-Winters exponential smoothing, and principal component analysis.…”
Section: Related Workmentioning
confidence: 99%
“…Thus, a new behavior can be delayed to be recognized. As a result, new patterns in the network data may not be detected rapidly [53]. To address this issue, we used a sliding window.…”
Section: B Ais Detection Modulementioning
confidence: 99%