skip to main content
10.1145/2388576.2388589acmconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
research-article

An efficient fuzzy controller based technique for network traffic classification to improve QoS

Authors Info & Claims
Published:25 October 2012Publication History

ABSTRACT

The network traffic management is a key issue as many new emerging applications are flooding the network with their packets. Several time sensitive and low bandwidth applications run along with other time insensitive and bandwidth intensive applications. As a result, most of the time, channel capacity is exhausted by the bandwidth intensive applications like P2P file sharing, Bittorent etc. Hence, there is a limited space left for critical applications. As a result, the accurate identification of network applications through proper observation of associated packets is vital to the areas of network management and surveillance. The overall implication of the accurate traffic management provides space for critical application and also it helps in better management of available network resources like channel capacity etc.

In this paper an approach is propose for the network traffic classification and bandwidth consumption by each protocol. It optimizes the use of the available network capacity and day to day traffic management. The usage of the bandwidth in the network is managed by taking accurate decisions for various types of applications.

Also we propose the priority based bandwidth management approach for management of bandwidth in network. The approach is also able to maintain the QoS requirement of the real time connections by marking the time insensitive but bandwidth intensive traffic. These packets may be dropped for proper traffic management.

References

  1. Nguyen, T. T. T. and Armitage, G.2008. A survey of techniques for internet traffic classification using machine learning. IEEE Communications Surveys & Tutorials 10, 4, (2008), 56--76. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Ferguson, D. 2006. P2P File Sharing - The Evolving Distribution Chain. CacheLogic, WDC, 2006.Google ScholarGoogle Scholar
  3. Kuai Xu, Z. Z., and Supratik Bhattacharyya. 2005. Profiling Internet Backbone Traffic: Bahavior Models and Applications. In Proceedings of the SIGCOMM on Applications, technologies, architectures, and protocols for computer communications 2005, Philadelphia, Pennsylvania, USA, 2005, 169--180,. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Gaogang Xie, Y. M. 2002. Dafang Zhang Router Performance Analysis Based on a Periodical Logarithmic Traffic Model. Chinese Journal of Computers, Vol.25, No.12 Dec.2002).Google ScholarGoogle Scholar
  5. A. Lakhina, M. C., C. Diot. 2004. Characterization of Network-Wide Traffic Anomalies in Traffic Flows. In Proceedings of the SIGCOMM conference on Internet measurement. Taormina, Sicily, Italy. 201--206, Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. G. V. Cristian Estan. 2002. New directions in traffic measurement and accounting. In Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications, Pittsburgh, Pennsylvania, USA. 323--336 Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Wikipedia - Quality of service. Available at http://en.wikipedia.org/wiki/Quality_of_service, Last accessed: June 25, 2012.Google ScholarGoogle Scholar
  8. Mohsin, M., Wong, W. and Bhatt, Y. 2002. Support for real-time traffic in the Internet, and QoS issues. Department of Computer Science, University of Texas at Dallas, March 30, 2002.Google ScholarGoogle Scholar
  9. Force, I. E. T. RFC 2475, An Architecture for Differentiated Services" section 2.3.3.3 - definition of "Shaper". Available at:http://tools.ietf.org/html/rfc2475\#section-2.3.3.3. Last updated: December, 1998. Last accessed: June 25, 2012.Google ScholarGoogle Scholar
  10. IANA The Internet Assigned Numbers Authority port-numbers. Available at: http://www.iana.org/assignments/port-numbers. Last accessed: June 25, 2012.Google ScholarGoogle Scholar
  11. Szabo, G., Szabo, I. and Orincsay, D. 2007. Accurate Traffic Classification in Proceedings of the. In Proceedings of the IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, 2007. Espoo, Finland. 1--8Google ScholarGoogle Scholar
  12. Jeffrey, E., Anirban, M. and Martin, A. 2007. Byte me: a case for byte accuracy in traffic classification. In Proceedings of the Proceedings of the 3rd annual ACM workshop on Mining network data (San Diego, California, USA, 2007). ACM, New York, NY, 35--38. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Iliofotou, M., Hyun-chul, K., Faloutsos, M., Mitzenmacher, M., Pappu, P. and Varghese, G. 2009. Graph-Based P2P Traffic Classification at the Internet Backbone. In Proceedings of the INFOCOM Workshops 2009. Rio de Janeiro. 1--6 Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Esoft. 2005. Modern Network Security: The Migration to Deep Packet Inspection. 2005Google ScholarGoogle Scholar
  15. Nigel, W., Sebastian, Z. and Grenville, A. 2006. A preliminary performance comparison of five machine learning algorithms for practical IP traffic flow classification. SIGCOMM Comput. Commun. Rev., 36, 5 2006, 5--16. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Subhabrata, S., Oliver, S. and Dongmei, W. 2004. Accurate, scalable in-network identification of p2p traffic using application signatures. In Proceedings of the 13th international conference on World Wide Web (New York, NY, USA, 2004). ACM, New York, USA, 512--521. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Chaudhary, A. and Sardana, A. 2011. Software Based Implementation Methodologies for Deep Packet Inspection. In Proceedings of the 2011 IEEE International Conference on Information Science and Applications (ICISA). Jeju Island, South Korea. 769--779.Google ScholarGoogle Scholar
  18. AbuHmed, T., Mohaisen, A. and Nyang, D. H., 2007. Deep Packet Inspection for Intrusion Detection Systems: A Survey. Technical Report, Security Research Laboratory, Inha University, Information Incheon 402--751, Korea, 2007.Google ScholarGoogle Scholar
  19. Zadeh, L. A. 1965. Fuzzy sets*. Information and control, 8, 3 1965), 338--353Google ScholarGoogle Scholar
  20. Zadeh, L. A. 1975. The concept of a linguistic variable and its application to approximate reasoning--I* Information sciences, 8, 3 1975, 199--249.Google ScholarGoogle Scholar
  21. Zadeh, L. A. 1996. Fuzzy algorithms. World Scientific Publishing Co., Inc., 1996Google ScholarGoogle Scholar
  22. Jung-Sun, K., Dong-Geun, K. and Bong-Nam, N. 2004. A fuzzy logic based expert system as a network forensics. In Proceedings of the 2004 IEEE International Conference on Fuzzy Systems. Hungary. 879--884.Google ScholarGoogle Scholar
  23. El-Hajj, W., Aloul, F., Trabelsi, Z. and Zaki, N. 2008. On Detecting Port Scanning using Fuzzy Based Intrusion Detection System. In Proceedings of the International Wireless Communications and Mobile Computing Conference. Crete Island. 105--110.Google ScholarGoogle Scholar
  24. Raahemi, B., Kouznetsov, A., Hayajneh, A. 2008. and Rabinovitch, P. Classification of Peer-to-Peer traffic using incremental neural networks (Fuzzy ARTMAP). In Proceedings of the Canadian Conference on Electrical and Computer Engineering, 2008. CCECE 2008. Canada. 719--724.Google ScholarGoogle Scholar
  25. Zhong, G., Guanming, L. and Daquan, G. 2009. A Novel P2P Traffic Identification Scheme Based on Support Vector Machine Fuzzy Network. In Proceedings of the Second International Workshop on Knowledge Discovery and Data Mining, 2009, WKDD 2009. Mascow, Russia. 909--912. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Murgu, A. 1997. Fuzzy clustering of aggregated flows for traffic control in ATM networks. In Proceedings of the Sixth IEEE International Conference on Fuzzy Systems, 1997. Spain. 235--240.Google ScholarGoogle ScholarCross RefCross Ref
  27. OpenDPI, Homepage. http://www.opendpi.org/, 2010.Google ScholarGoogle Scholar
  28. Chaudhary, A. 2011. An Efficient Fuzzy Controller Based Technique for Network Traffic Classification to Improve QoS. M. Tech. Dissertation, Indian Institute of Technology, Roorkee, Roorkee, India, 2011.Google ScholarGoogle Scholar
  29. Mamdani, E. H. and Assilian, S. 1975. An experiment in linguistic synthesis with a fuzzy logic controller. International Journal of Man-Machine Studies, 7, 1 1975), 1--13.Google ScholarGoogle ScholarCross RefCross Ref
  30. Ross, T. J. 2004. Fuzzy logic with engineering applications. John Wiley & Sons Ltd, West Sussex, England, 2004.Google ScholarGoogle Scholar
  31. Wikipedia List of TCP and UDP port numbers. Available at http://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers, Last accessed: June 25, 2012.Google ScholarGoogle Scholar
  32. Madhukar, A. and Williamson, C. 2006. A Longitudinal Study of P2P Traffic Classification. In Proceedings of the 14th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, 2006. MASCOTS 2006. Monterey, California, USA. 179--188. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Carvalho, D. A., Pereira, M. and Freire, M. M.. 2009. Detection of Peer-to-Peer TV Traffic Through Deep Packet Inspection. In Proceedings of the Acta da 9a Conf. sobre Redes de Computadores (Oeiras, Portugal, Oct.). INESC-ID and Instituto Superior Tt'ecnico, 6.Google ScholarGoogle Scholar

Index Terms

  1. An efficient fuzzy controller based technique for network traffic classification to improve QoS

                  Recommendations

                  Comments

                  Login options

                  Check if you have access through your login credentials or your institution to get full access on this article.

                  Sign in
                  • Published in

                    cover image ACM Conferences
                    SIN '12: Proceedings of the Fifth International Conference on Security of Information and Networks
                    October 2012
                    226 pages
                    ISBN:9781450316682
                    DOI:10.1145/2388576

                    Copyright © 2012 ACM

                    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                    Publisher

                    Association for Computing Machinery

                    New York, NY, United States

                    Publication History

                    • Published: 25 October 2012

                    Permissions

                    Request permissions about this article.

                    Request Permissions

                    Check for updates

                    Qualifiers

                    • research-article

                    Acceptance Rates

                    Overall Acceptance Rate102of289submissions,35%

                  PDF Format

                  View or Download as a PDF file.

                  PDF

                  eReader

                  View online with eReader.

                  eReader