Learning Network Traffic Dynamics Using Temporal Point Process

Accurate modeling of network traffic has a wide variety of applications. In this paper, we propose Network Transmission Point Process (NTPP), a probabilistic deep machinery that models the traffic characteristics of hosts on a network and effectively forecasts the network traffic patterns, such as load spikes. Existing stochastic models relied on the network traffic being self-similar in nature, thus failing to account for traffic anomalies. These anomalies, such as short-term traffic bursts, are very prevalent in certain modern-day traffic conditions, e.g. datacenter traffic, thus refuting the assumption of self-similarity. Our model is robust to such anomalies since it effectively leverages the self-exciting nature of the bursty network traffic using a temporal point process model.On seven diverse datasets collected from the fields of cyberdefense exercises (CDX), website access logs, datacenter traffic, and P2P traffic, NTPP offers a substantial performance boost in predicting network traffic characteristics against several baselines, ranging from forecasting the network traffic volume to detecting traffic spikes. We also demonstrate an application of our model to a caching scenario, showing that it can be used to effectively lower the cache miss rate.

[1]  F. Richard Yu,et al.  Load Balancing in Data Center Networks: A Survey , 2018, IEEE Communications Surveys & Tutorials.

[2]  Utkarsh Upadhyay,et al.  Recurrent Marked Temporal Point Processes: Embedding Event History to Vector , 2016, KDD.

[3]  Filip Radlinski,et al.  Query chains: learning to rank from implicit feedback , 2005, KDD '05.

[4]  Li Ling Ko,et al.  Anomaly Detection and Attribution in Networks With Temporally Correlated Traffic , 2018, IEEE/ACM Transactions on Networking.

[5]  György Terdik,et al.  Lévy flights and fractal modeling of internet traffic , 2009, TNET.

[6]  Jian Guo,et al.  eBA: Efficient Bandwidth Guarantee Under Traffic Variability in Datacenters , 2017, IEEE/ACM Transactions on Networking.

[7]  J. H. Zar,et al.  Spearman Rank Correlation , 2005 .

[8]  Felix Poloczek,et al.  Sharp per-flow delay bounds for bursty arrivals: The case of FIFO, SP, and EDF scheduling , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[9]  Nei Kato,et al.  Routing or Computing? The Paradigm Shift Towards Intelligent Computer Network Packet Transmission Based on Deep Learning , 2017, IEEE Transactions on Computers.

[10]  Fengyuan Ren,et al.  Improving ECN marking scheme with micro-burst traffic in data center networks , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.

[11]  Gaogang Xie,et al.  Accurate recovery of Internet traffic data: A tensor completion approach , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.

[12]  Qian Liu,et al.  QoE in Video Transmission: A User Experience-Driven Strategy , 2017, IEEE Communications Surveys & Tutorials.

[13]  Zhonghong Ou,et al.  Understanding I/O performance behaviors of cloud storage from a client's perspective , 2016, 2016 32nd Symposium on Mass Storage Systems and Technologies (MSST).

[14]  Marco Fiore,et al.  Joint spatial and temporal classification of mobile traffic demands , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.

[15]  Ming Zhang,et al.  MicroTE: fine grained traffic engineering for data centers , 2011, CoNEXT '11.

[16]  Fang Dong,et al.  Copula Analysis of Temporal Dependence Structure in Markov Modulated Poisson Process and Its Applications , 2017, ACM Trans. Model. Perform. Evaluation Comput. Syst..

[17]  Azer Bestavros,et al.  Self-similarity in World Wide Web traffic: evidence and possible causes , 1996, SIGMETRICS '96.

[18]  Arvind Krishnamurthy,et al.  High-resolution measurement of data center microbursts , 2017, Internet Measurement Conference.

[19]  Niloy Ganguly,et al.  STRM: A sister tweet reinforcement process for modeling hashtag popularity , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.

[20]  M.A. Masnadi-Shirazi,et al.  Arima model for network traffic prediction and anomaly detection , 2008, 2008 International Symposium on Information Technology.

[21]  Bengt Ahlgren,et al.  Traffic characteristics on 1Gbit/s access aggregation links , 2017, 2017 IEEE International Conference on Communications (ICC).

[22]  Mianxiong Dong,et al.  Learning IoT in Edge: Deep Learning for the Internet of Things with Edge Computing , 2018, IEEE Network.

[23]  Philippe Owezarski,et al.  Modeling Internet backbone traffic at the flow level , 2003, IEEE Trans. Signal Process..

[24]  Georgios Kambourakis,et al.  DDoS in the IoT: Mirai and Other Botnets , 2017, Computer.

[25]  Hong Liu,et al.  Predicting Inter-Data-Center Network Traffic Using Elephant Flow and Sublink Information , 2016, IEEE Transactions on Network and Service Management.

[26]  Kensuke Fukuda,et al.  Seven Years and One Day: Sketching the Evolution of Internet Traffic , 2009, IEEE INFOCOM 2009.

[27]  Le Song,et al.  Wasserstein Learning of Deep Generative Point Process Models , 2017, NIPS.

[28]  Ricardo A. S. Fernandes,et al.  An Open-Source Framework for Smart Meters: Data Communication and Security Traffic Analysis , 2019, IEEE Transactions on Industrial Electronics.