Efficient Network Monitoring System

  • Jiantao Gu
  • Yan Wu
  • Zhao Gu
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 308)


This paper has proposed a new generation of network monitoring system software by analysing the existing problems of network monitoring system. Through the functioning of system, it works out specific measures for data packet analysis and control, virtual-link-based network monitoring and board-aided application layer identification.


Network Monitoring Flow Online Identifying Monitoring Analysis 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Moore, A.W., Papagiannaki, K.: Toward the Accurate Identification of Network Applications. In: Dovrolis, C. (ed.) PAM 2005. LNCS, vol. 3431, pp. 41–54. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  2. 2.
    Karagiannis, T., Broido, A., Faloutsos, M., et al.: Transport layer identification of P2P traffic. In: Proc of the 4th Internet Measurement Conference, Taormina, Italy, pp. 121–134 (2004)Google Scholar
  3. 3.
    Sen, S., Spatscheck, O., Wang, D: Accurate, scalable network identification of P2P traffic using application signatures. In: Proc of WWW 2004, pp. 512–521. New York (2004)Google Scholar
  4. 4.
    Kang, H.J., Kim, M.S., Homg, J.W.: Streamingmedia and multimedia conferencing traffic analysis using payload examination. ETRI Journal 26(3), 203–217 (2004)CrossRefGoogle Scholar
  5. 5.
    van der Merwe, J., Caceres, R., Chu, Y.-H., et al.: Mmdump: a tool formonitoring Internetmultimedia traffic. ACM Computer Comm. Review 30(4), 48–59 (2000)CrossRefGoogle Scholar
  6. 6.
    Moore, A.W., Zuev, D.: Internet traffic classification using Bayesian analysis techniques. In: Moore, A.W., Zuev, D. (eds.) Proc. of ACM SIGMETRICS 2005, pp. 50–60 (2005)Google Scholar
  7. 7.
    Zuev, D., Moore, A.W.: Traffic Classification Using a Statistical Approach. In: Dovrolis, C. (ed.) PAM 2005. LNCS, vol. 3431, pp. 321–324. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  8. 8.
    Moore, A.W., Zuev, D.: Discriminators for use in flow-based classification. Intel Research, Cambridge (2004)Google Scholar
  9. 9.
    Postel, J.: Transmission Control Protocol. Information Sciences Institute, U. O. S. C. Transmission Control Protocol (September 1981)Google Scholar
  10. 10.
    Duffield, N.G., Lewis, J.T., O’Connell, N., Russell, R., Toomey, F.: Entropy of ATM traffic streams. IEEE Journal on Selected Areas in Communications 13(6), 981–990 (1995)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Jiantao Gu
    • 1
  • Yan Wu
    • 2
  • Zhao Gu
    • 3
  1. 1.College of ScienceHebei United UniversityTangshanChina
  2. 2.College of Foreign LanguagesHebei United UniversityTangshanChina
  3. 3.Qian’an CollegeHebei United UniversityQian’anChina

Personalised recommendations