Advertisement

An Effective Approach to Background Traffic Detection

  • Quang Tran MinhEmail author
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9446)

Abstract

Background (BG) traffic detection is an important task in network traffic analysis and management which helps to improve the QoS and QoE network services. Quickly detecting BG traffic from a huge amount of live traffic travelling in the network is a challenging research topic. This paper proposes a novel approach, namely the periodicity detection map (PDM), to quickly identify BG traffic based on periodicity analysis as BG traffic is commonly periodically generated by applications. However, it is not necessary that every BG traffic flow is periodic, hence the periodicity analysis based approaches cannot detect non-periodic BG flows. This paper also discusses the capability of applying a machine learning based classification method whose training dataset is collected from the results of the PDM method to solve this issue. Evaluation analysis and experimental results reveal the effectiveness and efficiency of the proposed approaches compared to the conventional methods in terms of computational costs, memory usage, and ratio of BG flows detected.

Keywords

Background/foreground traffic Traffic analysis  Periodicity Periodicity detection map Machine learning 

References

  1. 1.
    Huang J., Qian F., Mao Z. M., Sen S., Spatscheck O.: Screen-off traffic characterization and optimization in 3G/4G networks. In: Proceedings of the IMC 2012, Boston, Massachusetts, USA, pp. 357–364 (2012)Google Scholar
  2. 2.
    Meng L., Liu S., Striegel A.D.: Characterizing the utility of smartphone background traffic. In: Proceedings of the 23rd International Conference on Computer Communication and Networks (ICCCN), Shanghai, China, pp. 1–5 (2014)Google Scholar
  3. 3.
    Quang T. M., Koto H., Ano S., Chen L., Arakawa S., Murata M.: Proposal of Periodicity Detection Method for Separation of Background Traffic. IEICE Technical report, MoNA2014-55, vol. 114, no. 308, pp. 37–42 (2014)Google Scholar
  4. 4.
    Vishwanath K.V., Vahdat A.: Evaluating distributed systems: does background traffic matter? In: USENIX Annual Technical Conference, pp. 227–240 (2008)Google Scholar
  5. 5.
    Kenesi Z., Szabo Z., Belicza Z., Molnar S.: On the effect of the background traffic on TCPs throughput. In: Proceedings of the 10th IEEE Symposium on Computers and Communications, pp. 631–636 (2005)Google Scholar
  6. 6.
    NetSense. http://netsense.nd.edu/. Accessed Jun 2015
  7. 7.
    LiveLabs. http://centres.smu.edu.sg/livelabs/. Accessed Jun 2015
  8. 8.
    Berberidis, C., Vlahavas, I.P., Aref, W.G., Atallah, M.J., Elmagarmid, A.K.: On the discovery of weak periodicities in large time series. In: Elomaa, T., Mannila, H., Toivonen, H. (eds.) PKDD 2002. LNCS (LNAI), vol. 2431, pp. 51–61. Springer, Heidelberg (2002) CrossRefGoogle Scholar
  9. 9.
    Elfeky, M.G., Aref, W.G., Elmagarid, A.K.: Periodicity detection in time series databases. IEEE Trans. Knowl. Data Eng. 17(7), 875–887 (2005)CrossRefGoogle Scholar
  10. 10.
    Knuth, D.: The Art of Computer Programming. Computer Science and Information Processing, vol. 2, Second edn. Addison-Wesley, Reading (1981) zbMATHGoogle Scholar
  11. 11.
    Nguyen, T., Armitage, G.: A survey of techniques for Internet traffic classification using machine learning. IEEE Commun. Surv. Tutorials 10(4), 56–76 (2008)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  1. 1.Hochiminh City University of TechnologyHochiminh CityVietnam

Personalised recommendations