Traffic trace engineering

Pham Van Dung*, Marat Zhanikeev, Yoshiaki Tanaka

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Traffic traces captured from backbone links have been widely used in traffic analysis for many years. By far the most popular use of such traces is replay where conditions and states of the original traffic trace are recreated almost identically in simulation or emulation environments. When the end target of such research is detection of traffic anomalies, it is crucial that some anomalies are found in the trace in the first place. Traces with many real-life anomalies are rare, however. This paper pioneers a new area of research where traffic traces are engineered to contain traffic anomalies as per user request. The method itself is non-intrusive by retaining the IP address space found in the original trace. Engineering of several popular anomalies are shown in the paper while the method is flexible enough to accommodate any level of traffic trace engineering in the future.

Original languageEnglish
Title of host publicationManagement Enabling the Future Internet for Changing Business and New Computing Services - 12th Asia-Pacific Network Operations and Management Symposium, APNOMS 2009, Proceedings
Pages1-10
Number of pages10
DOIs
Publication statusPublished - 2009 Nov 4
Event12th Asia-Pacific Network Operations and Management Symposium, APNOMS 2009 - Jeju, Korea, Republic of
Duration: 2009 Sept 232009 Sept 25

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5787 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference12th Asia-Pacific Network Operations and Management Symposium, APNOMS 2009
Country/TerritoryKorea, Republic of
CityJeju
Period09/9/2309/9/25

Keywords

  • Analysis
  • Anomaly
  • Emulation
  • Replay
  • Simulation
  • Trace
  • Traffic

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint

Dive into the research topics of 'Traffic trace engineering'. Together they form a unique fingerprint.

Cite this