Empirically derived analytic models of wide-area TCP connections
IEEE/ACM Transactions on Networking (TON)
Analysis, modeling and generation of self-similar VBR video traffic
SIGCOMM '94 Proceedings of the conference on Communications architectures, protocols and applications
Wide area traffic: the failure of Poisson modeling
IEEE/ACM Transactions on Networking (TON)
SIGCOMM '95 Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication
Self-similarity in World Wide Web traffic: evidence and possible causes
IEEE/ACM Transactions on Networking (TON)
The 1999 DARPA off-line intrusion detection evaluation
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue on recent advances in intrusion detection systems
Difficulties in simulating the internet
IEEE/ACM Transactions on Networking (TON)
On the Self-similarity of Synthetic Traffic for the Evaluation of Intrusion Detection Systems
SAINT '03 Proceedings of the 2003 Symposium on Applications and the Internet
Micro-Synchronization in Conservative Parallel Network Simulation
Proceedings of the 22nd Workshop on Principles of Advanced and Distributed Simulation
Hi-index | 0.00 |
Many networking researches depend on an accurate simulation of network traffic. For example, Intrusion Detection Systems generally require tuning to be effective in each new environment. It follows that researchers need to produce traffic backgrounds for laboratory testing that accurately reflect the characteristics of organizations of interest. Because self-similarity is a common feature in today's network traffic, simulations which can produce the same degree of self-similarity as the original traffic are desired. The authors discovered that modeling some important protocol characteristics has required the use of hybrid modeling and heavy-tailed distributions. These include protocols like HTTP that account for a large percentage of traffic today although they were not present for studies done a few years ago. In this paper hybrid and heavy-tailed modeling techniques are used to build detailed models of major Internet protocols. NS-2 is used to simulate the Internet traffic captured at University of Central Florida and the result is compared against original traffic.