Skip to main content

Efficient Network Monitoring System

  • Conference paper

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 308))

Abstract

This paper has proposed a new generation of network monitoring system software by analysing the existing problems of network monitoring system. Through the functioning of system, it works out specific measures for data packet analysis and control, virtual-link-based network monitoring and board-aided application layer identification.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Moore, A.W., Papagiannaki, K.: Toward the Accurate Identification of Network Applications. In: Dovrolis, C. (ed.) PAM 2005. LNCS, vol. 3431, pp. 41–54. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  2. Karagiannis, T., Broido, A., Faloutsos, M., et al.: Transport layer identification of P2P traffic. In: Proc of the 4th Internet Measurement Conference, Taormina, Italy, pp. 121–134 (2004)

    Google Scholar 

  3. Sen, S., Spatscheck, O., Wang, D: Accurate, scalable network identification of P2P traffic using application signatures. In: Proc of WWW 2004, pp. 512–521. New York (2004)

    Google Scholar 

  4. Kang, H.J., Kim, M.S., Homg, J.W.: Streamingmedia and multimedia conferencing traffic analysis using payload examination. ETRI Journal 26(3), 203–217 (2004)

    Article  Google Scholar 

  5. van der Merwe, J., Caceres, R., Chu, Y.-H., et al.: Mmdump: a tool formonitoring Internetmultimedia traffic. ACM Computer Comm. Review 30(4), 48–59 (2000)

    Article  Google Scholar 

  6. Moore, A.W., Zuev, D.: Internet traffic classification using Bayesian analysis techniques. In: Moore, A.W., Zuev, D. (eds.) Proc. of ACM SIGMETRICS 2005, pp. 50–60 (2005)

    Google Scholar 

  7. Zuev, D., Moore, A.W.: Traffic Classification Using a Statistical Approach. In: Dovrolis, C. (ed.) PAM 2005. LNCS, vol. 3431, pp. 321–324. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  8. Moore, A.W., Zuev, D.: Discriminators for use in flow-based classification. Intel Research, Cambridge (2004)

    Google Scholar 

  9. Postel, J.: Transmission Control Protocol. Information Sciences Institute, U. O. S. C. Transmission Control Protocol (September 1981)

    Google Scholar 

  10. Duffield, N.G., Lewis, J.T., O’Connell, N., Russell, R., Toomey, F.: Entropy of ATM traffic streams. IEEE Journal on Selected Areas in Communications 13(6), 981–990 (1995)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Gu, J., Wu, Y., Gu, Z. (2012). Efficient Network Monitoring System. In: Liu, C., Wang, L., Yang, A. (eds) Information Computing and Applications. ICICA 2012. Communications in Computer and Information Science, vol 308. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34041-3_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-34041-3_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-34040-6

  • Online ISBN: 978-3-642-34041-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics