Toward highly reliable network traffic traces

Ali Ismail Awad, Hanafy Mahmud Ali, Heshasm F.A. Hamed

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Passive traffic collection is a good methodology to draw complete picture about network behavior. The collected traffic traces contain huge information for fully understanding the network characteristics, user behavior and network traffic engineering. These crucial activities should be supported with high fidelity traffic traces. This paper proposes a new approach for producing reliable traffic traces by monitoring the network interface as a first contact point in the traffic collection process, and provides a meta-data (meta-trace) report that is used to judge the reliability of the collected traffic trace in a post-processing phase. The proposed approach relies on monitoring the appropriated statistical indicators by directly consulting the Ethernet network interface card hardware. The conducted experiments prove the superiority of the proposed approach in producing error free, reliable and high fidelity traffic traces using commodity hardware and software under a limited budget.

Original languageEnglish
Title of host publication2013 1st International Conference on Communications, Signal Processing and Their Applications, ICCSPA 2013
DOIs
Publication statusPublished - 2013
Externally publishedYes
Event2013 1st International Conference on Communications, Signal Processing and Their Applications, ICCSPA 2013 - Sharjah, United Arab Emirates
Duration: Feb 12 2013Feb 14 2013

Publication series

Name2013 1st International Conference on Communications, Signal Processing and Their Applications, ICCSPA 2013

Other

Other2013 1st International Conference on Communications, Signal Processing and Their Applications, ICCSPA 2013
Country/TerritoryUnited Arab Emirates
CitySharjah
Period2/12/132/14/13

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Signal Processing

Fingerprint

Dive into the research topics of 'Toward highly reliable network traffic traces'. Together they form a unique fingerprint.

Cite this