Skip to main content

In Search of Torrents: Automatic Detection of Logical Sets Flows in Network Traffic

  • Conference paper
  • First Online:
Databases in Networked Information Systems (DNIS 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2544))

Included in the following conference series:

  • 479 Accesses

Abstract

For network monitoring, management and operations it is important to understand the nature of the network traffic flowing at a point in the network. Torrent, the set of all flows on a network link and s-torrents, logical sets of flows of network traffic are very useful in this context. However detecting and measuring torrent and the constituent s-torrents automatically is a challenge. In this work we describe a novel method to detect and measure torrents. We show the usefulness of the method in obtaining a more effective and deeper insight into the network’s behavior and utilization.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. B. Ryu, D. Cheney, and H-W. Braun, “Internet Flow Characterization-Adaptive Timeout and Statistical Modeling,” PAM2001 workshop paper.

    Google Scholar 

  2. B. Krishnamurthy, and J. Wang, “On network-aware clustering of web clients,” In Proceedings of ACM SIGCOMM’ 00, August 2000.

    Google Scholar 

  3. D.D. Clark, “Policy routing in Internet protocols,” RFC1102, IETF, 1989.

    Google Scholar 

  4. K. Cho, K. Mitsuya, and A. Kato, “Traffic data repository at the WIDE project,” In USENIX 2000 Annual Technical Conference: FREENIX Track, page 263–270, June 2000.

    Google Scholar 

  5. K. Cho, R. Kaizaki, and A. Kato, “Aguri:An Aggregation-based Traffic Profiler,” In Proceedings of QofIS2001 (published by Springer-Verlag in the LCNS series). September 2001.

    Google Scholar 

  6. K.C. Claffy, H-W. Braun, and G.C. Polyzos, “A parameterizable methodology for Internet traffic flow profiling,” IEEE Journal of Selected Areas in Communications, 13(8):1481–1494,1995.

    Article  Google Scholar 

  7. N. Brownlee, “Using NeTraMet for Production Traffic Measurement,” Intelligent Management Conference(IM2001), May 2001.

    Google Scholar 

  8. N. Brownlee, C. Mills, and G. Ruth, “Traffic flow measurement: Architecture,” RFC 2722, IETF, October 1999.

    Google Scholar 

  9. N. Brownlee, and M. Murray, “Streams,Flows and Torrents,” In PAM 2001.

    Google Scholar 

  10. S. Waldbusser, “Remote Network Monitoring Management Information Base,” RFC 1271, IETF, November 1991.

    Google Scholar 

  11. T. Bates, E. Gerich, L. Joncheray, J-M. Jouanigot, D. Karrenberg, M. Terpstra, and J. Yu, “Representation of IP Routing Policies in a Routing Registry(ripe-81++),” RFC 1786, IETF, 1995.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kazuhide, K., Mansfield Keeni, G., Norio, S. (2002). In Search of Torrents: Automatic Detection of Logical Sets Flows in Network Traffic. In: Bhalla, S. (eds) Databases in Networked Information Systems. DNIS 2002. Lecture Notes in Computer Science, vol 2544. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36233-9_19

Download citation

  • DOI: https://doi.org/10.1007/3-540-36233-9_19

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-00264-2

  • Online ISBN: 978-3-540-36233-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics