Skip to main content

NNSDS: Network Nodes’ Social Attributes Discovery System Based on Netflow

  • Conference paper
Web Technologies and Applications (APWeb 2014)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 8710))

Included in the following conference series:

  • 1631 Accesses

Abstract

Currently, the most network traffic identification technologies focus on the applications of traffic, while ignoring the attributes of network terminal nodes which generate traffic. In this paper, we present a novel approach to identify the social attributes of network terminal nodes and design Netflow based network Nodes’ Social attributes Discovery System(NNSDS).Firstly, we store the Netflow records using two hash tables to obtain the snapshots of the activity of the network. Then we discover the attributes of network nodes by the following elements: (1) social topology statistics, (2) social activity and (3) social roles of network nodes. We test our system on an IP backbone network. The experimental results show that our system can correctly identify various types of network nodes and the identification accuracy achieves 95%.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Tan, Y., Wu, J., Deng, H.: Evaluation method for node importance based on node contraction in complex networks. Systems Engineering-Theory & Practice 11, 79–83 (2006)

    Google Scholar 

  2. Costa, L.F., Rodrigues, F.A., Travieso, G., et al.: Characterization of complex networks: A survey of measurements. Advances in Physics 56(1), 167–242 (2007)

    Article  Google Scholar 

  3. Cisco I O S. Netflow introduction (September 2006), http://www.cisco.com

  4. Estan, C., Varghese, G.: New directions in traffic measurement and accounting. ACM (2002)

    Google Scholar 

  5. Wang, C., Chen, W., Zhang, J.: Challenging Scientific Problems of Technology and Application of Big Data. Bulletin of National Natural Science Foundation of China (2014)

    Google Scholar 

  6. IPFIX. Internet Engineering Task Force, IP Flow Information Export Working Group, http://www.ietf.org/html.charters/ipfix-charter.html

  7. Cisco Sampled Netflow, http://www.cisco.com

  8. Choi, B.Y., Bhattacharyya, S.: On the accuracy and overhead of cisco sampled netflow. In: Proceedings of ACM SIGMETRICS Workshop on Large Scale Network Inference (LSNI) (2005)

    Google Scholar 

  9. Chen, N., Xu, T.: Study on NetFlow-based network traffic data collection and storage. Application Research of Computers 2, 75 (2008)

    Google Scholar 

  10. Li, M., Ye, J., Li, J.: Network Traffic Management Based on Hash Aggregation. Journal of Jiangxi Normal University (Natural Science) 35(3), 174–177 (2011)

    Google Scholar 

  11. Eager, D., Vernon, M., Zahorjan, J.: Optimal and efficient merging schedules for video-on-demand servers. In: Proceedings of the Seventh ACM International Conference on Multimedia (Part 1), pp. 199–202. ACM (1999)

    Google Scholar 

  12. Mokbel, M.F., Lu, M., Aref, W.G.: Hash-merge join: A non-blocking join algorithm for producing fast and early join results. In: Proceedings of the 20th International Conference on Data Engineering, pp. 251–262. IEEE (2004)

    Google Scholar 

  13. Naumann, F., Häussler, M.: Declarative data merging with conflict resolution (2002)

    Google Scholar 

  14. Lv, Z., Zheng, J., Huang, H.: A Distributed Real-Time Intrusion Detection System for High-Speed Network. Journal of Computer Research and Development 41(4), 667–673 (2004)

    Google Scholar 

  15. Paxson, V., Mahdavi, J., Mathis, M., et al.: Framework for IP performance metrics. Framework (1998)

    Google Scholar 

  16. Wang, J., Zhu, K., Wang, F.: Microblog Fans Network Evolving Model based on User Social Characteristics and Attractiveness of Behavior Properties. Journal of Computer Application 33(10), 2753–2756 (2013)

    Article  Google Scholar 

  17. Karagiannis, T., Papagiannaki, K., Faloutsos, M.: BLINC: multilevel traffic classification in the dark. In: ACM SIGCOMM Computer Communication Review, vol. 35(4), pp. 229–240. ACM (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Mao, S., Wu, Z., Sun, B., Cao, S., Du, X., Wang, K. (2014). NNSDS: Network Nodes’ Social Attributes Discovery System Based on Netflow. In: Han, W., Huang, Z., Hu, C., Zhang, H., Guo, L. (eds) Web Technologies and Applications. APWeb 2014. Lecture Notes in Computer Science, vol 8710. Springer, Cham. https://doi.org/10.1007/978-3-319-11119-3_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-11119-3_22

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-11118-6

  • Online ISBN: 978-3-319-11119-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics