Application of the Karhunen-Loeve Procedure for the Characterization of Human Faces
IEEE Transactions on Pattern Analysis and Machine Intelligence
On the self-similar nature of Ethernet traffic (extended version)
IEEE/ACM Transactions on Networking (TON)
Wide area traffic: the failure of Poisson modeling
IEEE/ACM Transactions on Networking (TON)
Deriving traffic demands for operational IP networks: methodology and experience
IEEE/ACM Transactions on Networking (TON)
Pop-level and access-link-level traffic dynamics in a tier-1 POP
IMW '01 Proceedings of the 1st ACM SIGCOMM Workshop on Internet Measurement
Traffic matrix estimation: existing techniques and new directions
Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications
A signal analysis of network traffic anomalies
Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment
Internet intrusions: global characteristics and prevalence
SIGMETRICS '03 Proceedings of the 2003 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
Fast accurate computation of large-scale IP traffic matrices from link loads
SIGMETRICS '03 Proceedings of the 2003 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
An information-theoretic approach to traffic matrix estimation
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
Estimating flow distributions from sampled flow statistics
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
Proceedings of the 3rd ACM SIGCOMM conference on Internet measurement
Sketch-based change detection: methods, evaluation, and applications
Proceedings of the 3rd ACM SIGCOMM conference on Internet measurement
How to identify and estimate the largest traffic matrix elements in a dynamic environment
Proceedings of the joint international conference on Measurement and modeling of computer systems
Aberrant Behavior Detection in Time Series for Network Monitoring
LISA '00 Proceedings of the 14th USENIX conference on System administration
Flow classification by histograms: or how to go on safari in the internet
Proceedings of the joint international conference on Measurement and modeling of computer systems
Diagnosing network-wide traffic anomalies
Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications
Network sensitivity to hot-potato disruptions
Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications
Exploring the subspace method for network-wide anomaly diagnosis
Proceedings of the ACM SIGCOMM workshop on Network troubleshooting: research, theory and operations practice meet malfunctioning reality
Characterization of network-wide anomalies in traffic flows
Proceedings of the 4th ACM SIGCOMM conference on Internet measurement
Proceedings of the 4th ACM SIGCOMM conference on Internet measurement
Traffic matrices: balancing measurements, inference and modeling
SIGMETRICS '05 Proceedings of the 2005 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
The problem of synthetically generating IP traffic matrices: initial recommendations
ACM SIGCOMM Computer Communication Review
Mining anomalies using traffic feature distributions
Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications
Simplifying the synthesis of internet traffic matrices
ACM SIGCOMM Computer Communication Review
A fast lightweight approach to origin-destination IP traffic estimation using partial measurements
IEEE/ACM Transactions on Networking (TON) - Special issue on networking and information theory
Toward sophisticated detection with distributed triggers
Proceedings of the 2006 SIGCOMM workshop on Mining network data
Eigen-trend: trend analysis in the blogosphere based on singular value decompositions
CIKM '06 Proceedings of the 15th ACM international conference on Information and knowledge management
A methodology for evaluating runtime support in network processors
Proceedings of the 2006 ACM/IEEE symposium on Architecture for networking and communications systems
Diagnosing network disruptions with network-wide analysis
Proceedings of the 2007 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
Sensitivity of PCA for traffic anomaly detection
Proceedings of the 2007 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
Passive measurement of one-way and two-way flow lifetimes
ACM SIGCOMM Computer Communication Review
Singular spectrum analysis of traffic workload in a large-scale wireless lan
Proceedings of the 10th ACM Symposium on Modeling, analysis, and simulation of wireless and mobile systems
Machine learning approaches to network anomaly detection
SYSML'07 Proceedings of the 2nd USENIX workshop on Tackling computer systems problems with machine learning techniques
CSAMP: a system for network-wide flow monitoring
NSDI'08 Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation
Traffic Aggregation for Malware Detection
DIMVA '08 Proceedings of the 5th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment
The Contact Surface: A Technique for Exploring Internet Scale Emergent Behaviors
DIMVA '08 Proceedings of the 5th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment
Anomaly Characterization in Flow-Based Traffic Time Series
IPOM '08 Proceedings of the 8th IEEE international workshop on IP Operations and Management
Towards a meaningful MRA of traffic matrices
Proceedings of the 8th ACM SIGCOMM conference on Internet measurement
Application of attractor selection to adaptive virtual network topology control
Proceedings of the 3rd International Conference on Bio-Inspired Models of Network, Information and Computing Sytems
Proceedings of the eleventh international joint conference on Measurement and modeling of computer systems
Delay tolerant bulk data transfers on the internet
Proceedings of the eleventh international joint conference on Measurement and modeling of computer systems
Spatio-temporal compressive sensing and internet traffic matrices
Proceedings of the ACM SIGCOMM 2009 conference on Data communication
Practical connectivity-based routing in wireless sensor networks using dimension reduction
SECON'09 Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
Robust virtual network topology control based on attractor selection
ONDM'09 Proceedings of the 13th international conference on Optical Network Design and Modeling
A Methodology of Traffic Engineering to IP Backbone
IPOM '09 Proceedings of the 9th IEEE International Workshop on IP Operations and Management
Anomalies detection in mobile network management data
DASFAA'07 Proceedings of the 12th international conference on Database systems for advanced applications
Logging every footstep: quantile summaries for the entire history
Proceedings of the 2010 ACM SIGMOD International Conference on Management of data
A distribution-based approach to anomaly detection and application to 3G mobile traffic
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
On the use of random neural networks for traffic matrix estimation in large-scale IP networks
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference
A PCA-based approach for exploring space-time structure of urban mobility dynamics
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference
Monitoring abnormal traffic flows based on independent component analysis
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Computer Networks: The International Journal of Computer and Telecommunications Networking
Global modeling of backbone network traffic
INFOCOM'10 Proceedings of the 29th conference on Information communications
Outsourcing home network security
Proceedings of the 2010 ACM SIGCOMM workshop on Home networks
Distribution-based anomaly detection in 3G mobile networks: from theory to practice
International Journal of Network Management
Experimental analysis and characterization of a wireless sensor network environment
Proceedings of the 7th ACM workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
NetEx: efficient and cost-effective internet bulk content delivery
Proceedings of the 6th ACM/IEEE Symposium on Architectures for Networking and Communications Systems
Real-time detection of traffic anomalies in wireless mesh networks
Wireless Networks
BasisDetect: a model-based network event detection framework
IMC '10 Proceedings of the 10th ACM SIGCOMM conference on Internet measurement
Proceedings of the 6th International COnference
Dynamic feature analysis and measurement for large-scale network traffic monitoring
IEEE Transactions on Information Forensics and Security
Properties and Evolution of Internet Traffic Networks from Anonymized Flow Data
ACM Transactions on Internet Technology (TOIT)
Computer Networks: The International Journal of Computer and Telecommunications Networking
Monitoring abnormal network traffic based on blind source separation approach
Journal of Network and Computer Applications
Joint time-frequency sparse estimation of large-scale network traffic
Computer Networks: The International Journal of Computer and Telecommunications Networking
Forty data communications research questions
ACM SIGCOMM Computer Communication Review
An approximation method of origin-destination flow traffic from link load counts
Computers and Electrical Engineering
Computer Networks: The International Journal of Computer and Telecommunications Networking
Internet traffic mid-term forecasting: a pragmatic approach using statistical analysis tools
NETWORKING'06 Proceedings of the 5th international IFIP-TC6 conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems
Echidna: efficient clustering of hierarchical data for network traffic analysis
NETWORKING'06 Proceedings of the 5th international IFIP-TC6 conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems
An automatic and generic early-bird system for internet backbone based on traffic anomaly detection
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part I
Traffic matrix reloaded: impact of routing changes
PAM'05 Proceedings of the 6th international conference on Passive and Active Network Measurement
Structural analysis of network traffic matrix via relaxed principal component pursuit
Computer Networks: The International Journal of Computer and Telecommunications Networking
Selective resource characterization for evaluation of system dynamics
ACM SIGMETRICS Performance Evaluation Review
Estimation of data traffic flows from aggregate measurements
Mathematical and Computer Modelling: An International Journal
Spatio-temporal compressive sensing and internet traffic matrices
IEEE/ACM Transactions on Networking (TON)
Automatic network intrusion detection: Current techniques and open issues
Computers and Electrical Engineering
Effects of spatial aggregation on the characteristics of origin-destination pair traffic in funet
NEW2AN'07 Proceedings of the 7th international conference on Next Generation Teletraffic and Wired/Wireless Advanced Networking
On traffic matrix completion in the internet
Proceedings of the 2012 ACM conference on Internet measurement conference
Review: A survey of network flow applications
Journal of Network and Computer Applications
A power laws-based reconstruction approach to end-to-end network traffic
Journal of Network and Computer Applications
Multimedia Tools and Applications
LCD-Net: lowest cost denominator networking
ACM SIGCOMM Computer Communication Review
Data clustering based on correlation analysis applied to highly variable domains
Computer Networks: The International Journal of Computer and Telecommunications Networking
Computer Networks: The International Journal of Computer and Telecommunications Networking
A methodological overview on anomaly detection
DataTraffic Monitoring and Analysis
Distribution-Based anomaly detection in network traffic
DataTraffic Monitoring and Analysis
Delay-tolerant bulk data transfers on the internet
IEEE/ACM Transactions on Networking (TON)
Detecting correlation between server resources for system management
Journal of Computer and System Sciences
Characterizing home network traffic: an inside view
Personal and Ubiquitous Computing
Real-time analysis and management of big time-series data
IBM Journal of Research and Development
Hi-index | 0.00 |
Network traffic arises from the superposition of Origin-Destination (OD) flows. Hence, a thorough understanding of OD flows is essential for modeling network traffic, and for addressing a wide variety of problems including traffic engineering, traffic matrix estimation, capacity planning, forecasting and anomaly detection. However, to date, OD flows have not been closely studied, and there is very little known about their properties.We present the first analysis of complete sets of OD flow time-series, taken from two different backbone networks (Abilene and Sprint-Europe). Using Principal Component Analysis (PCA), we find that the set of OD flows has small intrinsic dimension. In fact, even in a network with over a hundred OD flows, these flows can be accurately modeled in time using a small number (10 or less) of independent components or dimensions.We also show how to use PCA to systematically decompose the structure of OD flow timeseries into three main constituents: common periodic trends, short-lived bursts, and noise. We provide insight into how the various constitutents contribute to the overall structure of OD flows and explore the extent to which this decomposition varies over time.