On the self-similar nature of Ethernet traffic (extended version)
IEEE/ACM Transactions on Networking (TON)
Wide area traffic: the failure of Poisson modeling
IEEE/ACM Transactions on Networking (TON)
IEEE/ACM Transactions on Networking (TON)
Self-similarity in World Wide Web traffic: evidence and possible causes
IEEE/ACM Transactions on Networking (TON)
Generating representative Web workloads for network and server performance evaluation
SIGMETRICS '98/PERFORMANCE '98 Proceedings of the 1998 ACM SIGMETRICS joint international conference on Measurement and modeling of computer systems
Data networks as cascades: investigating the multifractal nature of Internet WAN traffic
Proceedings of the ACM SIGCOMM '98 conference on Applications, technologies, architectures, and protocols for computer communication
A performance evaluation of hyper text transfer protocols
SIGMETRICS '99 Proceedings of the 1999 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
Dynamics of IP traffic: a study of the role of variability and the impact of control
Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication
IP packet generation: statistical models for TCP start times based on connection-rate superposition
Proceedings of the 2000 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
Fixed point approximations for TCP behavior in an AQM network
Proceedings of the 2001 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
Statistical bandwidth sharing: a study of congestion at flow level
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
Difficulties in simulating the internet
IEEE/ACM Transactions on Networking (TON)
GISMO: a Generator of Internet Streaming Media Objects and workloads
ACM SIGMETRICS Performance Evaluation Review
Self-Similar Network Traffic and Performance Evaluation
Self-Similar Network Traffic and Performance Evaluation
Estimating flow distributions from sampled flow statistics
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
Measurements and Analysis of End-to-End Internet Dynamics
Measurements and Analysis of End-to-End Internet Dynamics
The OSU Flow-tools Package and CISCO NetFlow Logs
LISA '00 Proceedings of the 14th USENIX conference on System administration
FlowScan: A Network Traffic Flow Reporting and Visualization Tool
LISA '00 Proceedings of the 14th USENIX conference on System administration
An integrated experimental environment for distributed systems and networks
OSDI '02 Proceedings of the 5th symposium on Operating systems design and implementationCopyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading
Scalability and accuracy in a large-scale network emulator
OSDI '02 Proceedings of the 5th symposium on Operating systems design and implementationCopyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading
Monkey see, monkey do: a tool for TCP tracing and replaying
ATEC '04 Proceedings of the annual conference on USENIX Annual Technical Conference
Modeling Internet backbone traffic at the flow level
IEEE Transactions on Signal Processing
Wavelet analysis of long-range-dependent traffic
IEEE Transactions on Information Theory
Packet-level traffic measurements from the Sprint IP backbone
IEEE Network: The Magazine of Global Internetworking
A framework for malicious workload generation
Proceedings of the 4th ACM SIGCOMM conference on Internet measurement
Improving accuracy in end-to-end packet loss measurement
Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications
Tmix: a tool for generating realistic TCP application workloads in ns-2
ACM SIGCOMM Computer Communication Review
Realistic and responsive network traffic generation
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
A methodology for evaluating runtime support in network processors
Proceedings of the 2006 ACM/IEEE symposium on Architecture for networking and communications systems
A unified load generator based on formal load specification and load transformation
valuetools '06 Proceedings of the 1st international conference on Performance evaluation methodolgies and tools
Laboratory-based calibration of available bandwidth estimation tools
Microprocessors & Microsystems
A machine learning approach to TCP throughput prediction
Proceedings of the 2007 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
Accurate and efficient SLA compliance monitoring
Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications
Evaluation of network traffic workload scaling techniques
Computer Communications
Legal issues surrounding monitoring during network research
Proceedings of the 7th ACM SIGCOMM conference on Internet measurement
An active measurement system for shared environments
Proceedings of the 7th ACM SIGCOMM conference on Internet measurement
Collaborative Detection of DDoS Attacks over Multiple Network Domains
IEEE Transactions on Parallel and Distributed Systems
Distributed change-point detection of DDoS attacks: experimental results on DETER testbed
DETER Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test on DETER Community Workshop on Cyber Security Experimentation and Test 2007
HotBots'07 Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets
An SLA perspective on the router buffer sizing problem
ACM SIGMETRICS Performance Evaluation Review
Router buffer sizing revisited: the role of the output/input capacity ratio
CoNEXT '07 Proceedings of the 2007 ACM CoNEXT conference
A geometric approach to improving active packet loss measurement
IEEE/ACM Transactions on Networking (TON)
Evaluating distributed systems: does background traffic matter?
ATC'08 USENIX 2008 Annual Technical Conference on Annual Technical Conference
Using LiTGen, a realistic IP traffic model, to evaluate the impact of burstiness on performance
Proceedings of the 1st international conference on Simulation tools and techniques for communications, networks and systems & workshops
Experimental study of router buffer sizing
Proceedings of the 8th ACM SIGCOMM conference on Internet measurement
Performing time-sensitive network experiments
Proceedings of the 4th ACM/IEEE Symposium on Architectures for Networking and Communications Systems
Modeling and emulation of internet paths
NSDI'09 Proceedings of the 6th USENIX symposium on Networked systems design and implementation
Swing: realistic and responsive network traffic generation
IEEE/ACM Transactions on Networking (TON)
Automated pseudo-live testing of firewall configuration enforcement
IEEE Journal on Selected Areas in Communications - Special issue on network infrastructure configuration
Router buffer sizing for TCP traffic and the role of the output/input capacity ratio
IEEE/ACM Transactions on Networking (TON)
On the accuracy of TCP throughput prediction for opportunistic wireless networks
SECON'09 Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
A versatile probability distribution for light and heavy tails of web file sizes
WCNC'09 Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference
Techniques for simulation of realistic infrastructure wireless network traffic
WiOPT'09 Proceedings of the 7th international conference on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks
Linear Representation of Network Traffic
Mobile Networks and Applications
Automating the injection of believable decoys to detect snooping
Proceedings of the third ACM conference on Wireless network security
LiTGen, a lightweight traffic generator: application to P2P and mail wireless traffic
PAM'07 Proceedings of the 8th international conference on Passive and active network measurement
Fast classification and estimation of internet traffic flows
PAM'07 Proceedings of the 8th international conference on Passive and active network measurement
Catching IP traffic burstiness with a lightweight generator
NETWORKING'07 Proceedings of the 6th international IFIP-TC6 conference on Ad Hoc and sensor networks, wireless networks, next generation internet
Performance evaluation of end-to-end path capacity measurement tools in a controlled environment
GPC'08 Proceedings of the 3rd international conference on Advances in grid and pervasive computing
A flow trace generator using graph-based traffic classification techniques
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference
Multiobjective monitoring for SLA compliance
IEEE/ACM Transactions on Networking (TON)
A fluid background traffic model
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Proceedings of the ACM SIGCOMM 2010 conference
RAID'10 Proceedings of the 13th international conference on Recent advances in intrusion detection
Forwarding devices: From measurements to simulations
ACM Transactions on Modeling and Computer Simulation (TOMACS)
A machine learning approach to TCP throughput prediction
IEEE/ACM Transactions on Networking (TON)
Characterizing and modeling internet traffic dynamics of cellular devices
Proceedings of the ACM SIGMETRICS joint international conference on Measurement and modeling of computer systems
Characterizing and modeling internet traffic dynamics of cellular devices
ACM SIGMETRICS Performance Evaluation Review - Performance evaluation review
ExperimenTor: a testbed for safe and realistic tor experimentation
CSET'11 Proceedings of the 4th conference on Cyber security experimentation and test
Efficient and realistic generation of IP addresses
Proceedings of the 4th International ICST Conference on Simulation Tools and Techniques
Simulating content in traffic for benchmarking intrusion detection systems
Proceedings of the 4th International ICST Conference on Simulation Tools and Techniques
Load modeling and generation for IP-Based networks: a unified approach and tool support
MMB&DFT'10 Proceedings of the 15th international GI/ITG conference on Measurement, Modelling, and Evaluation of Computing Systems and Dependability and Fault Tolerance
Opportunistic flow-level latency estimation using consistent netflow
IEEE/ACM Transactions on Networking (TON)
UniLoG: a unified load generation tool
MMB'12/DFT'12 Proceedings of the 16th international GI/ITG conference on Measurement, Modelling, and Evaluation of Computing Systems and Dependability and Fault Tolerance
An application-level content generative model for network applications
Proceedings of the 5th International ICST Conference on Simulation Tools and Techniques
Workload resampling for performance evaluation of parallel job schedulers
Proceedings of the 4th ACM/SPEC International Conference on Performance Engineering
Real-time volume control for interactive network traffic replay
Computer Networks: The International Journal of Computer and Telecommunications Networking
Fast, accurate simulation for SDN prototyping
Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking
Design and implementation of XBurner
Proceedings of the 6th International ICST Conference on Simulation Tools and Techniques
Proceedings of the 6th International ICST Conference on Simulation Tools and Techniques
COSMO - emulation of internet traffic: poster abstract
Proceedings of the 6th International ICST Conference on Simulation Tools and Techniques
Flow-based partitioning of network testbed experiments
Computer Networks: The International Journal of Computer and Telecommunications Networking
A system for generating and injecting indistinguishable network decoys
Journal of Computer Security
Hi-index | 0.00 |
The ability to generate repeatable, realistic network traffic is critical in both simulation and testbed environments. Traffic generation capabilities to date have been limited to either simple sequenced packet streams typically aimed at throughput testing, or to application-specific tools focused on, for example, recreating representative HTTP requests. In this paper we describe Harpoon, a new application-independent tool for generating representative packet traffic at the IP flow level. Harpoon generates TCP and UDP packet flows that have the same byte, packet, temporal and spatial characteristics as measured at routers in live environments. Harpoon is distinguished from other tools that generate statistically representative traffic in that it can self-configure by automatically extracting parameters from standard Netflow logs or packet traces. We provide details on Harpoon's architecture and implementation, and validate its capabilities in controlled laboratory experiments using configurations derived from flow and packet traces gathered in live environments. We then demonstrate Harpoon's capabilities in a router benchmarking experiment that compares Harpoon with commonly used throughput test methods. Our results show that the router subsystem load generated by Harpoon is significantly different, suggesting that this kind of test can provide important insights into how routers might behave under actual operating conditions.