A sequential test approach for policing mechanisms to deal with monofractal and multifractal traffic

In this paper, the multifractal leaky bucket, a novel traffic policing mechanism capable of accurately monitoring multifractal traffic sources, is introduced. The multifractal leaky bucket algorithm is based on the multifractal envelope process introduced in C. A. V. Melo et al., (2004). Simulation experiments using both real and synthetic data show that the proposed algorithm is an effective policing mechanism to deal with multifractal traffic. The multifractal leaky bucket is proved to be a generalization of the fractal leaky bucket, a traffic policing mechanism capable of accurately monitoring monofractal sources presented in N. L. S. Fonseca et al., (2000). In addition, we introduce a novel approach based on sequential tests to represent policing algorithms

[1]  Richard G. Baraniuk,et al.  Multiscale queuing analysis of long-range-dependent network traffic , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).

[2]  Abhay Parekh,et al.  A generalized processor sharing approach to flow control in integrated services networks: the single-node case , 1993, TNET.

[3]  Nelson Luis Saldanha da Fonseca,et al.  Statistical multiplexing of multifractal flows , 2004, 2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577).

[4]  Moshe Sidi,et al.  On the performance of bursty and modulated sources subject to leaky bucket rate-based access control schemes , 1994, IEEE Trans. Commun..

[5]  Nelson Luis Saldanha da Fonseca,et al.  On the equivalent bandwidth of self-similar sources , 2000, TOMC.

[6]  Sally Floyd,et al.  Wide area traffic: the failure of Poisson modeling , 1995, TNET.

[7]  Kang G. Shin,et al.  Detecting SYN flooding attacks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[8]  J. A. Silvester,et al.  The Effectiveness of Multi-Level Policing Mechanisms in ATM Traffic Control , .

[9]  Richard Baraniuk,et al.  The Multiscale Nature of Network Traffic: Discovery, Analysis, and Modelling , 2003 .

[10]  Erwin P. Rathgeb Modeling and Performance Comparison of Policing Mechanisms for ATM Networks , 1991, IEEE J. Sel. Areas Commun..

[11]  Walter Willinger,et al.  Long-range dependence in variable-bit-rate video traffic , 1995, IEEE Trans. Commun..

[12]  Iraj Saniee,et al.  Performance impacts of multi-scaling in wide area TCP/IP traffic , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).

[13]  Walter Willinger,et al.  Analysis, modeling and generation of self-similar VBR video traffic , 1994, SIGCOMM.

[14]  Nelson Luis Saldanha da Fonseca,et al.  An envelope process for multifractal traffic modeling , 2004, 2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577).

[15]  R. Peltier,et al.  Multifractional Brownian Motion : Definition and Preliminary Results , 1995 .

[16]  Alexander G. Tartakovsky,et al.  A novel approach to detection of \denial{of{service" attacks via adaptive sequential and batch{sequential change{point detection methods , 2001 .

[17]  John A. Silvester,et al.  Time scale analysis of an ATM queueing system with long-range dependent traffic , 1997, Proceedings of INFOCOM '97.

[18]  Rein Vesilo Cumulative sum technique in ATM traffic management , 1998, IEEE GLOBECOM 1998 (Cat. NO. 98CH36250).

[19]  Mischa Schwartz,et al.  Broadband integrated networks , 1996 .

[20]  Patrice Abry,et al.  A Wavelet-Based Joint Estimator of the Parameters of Long-Range Dependence , 1999, IEEE Trans. Inf. Theory.

[21]  Richard G. Baraniuk,et al.  Multiscale nature of network traffic , 2002, IEEE Signal Process. Mag..

[22]  Mark W. Garrett,et al.  Modeling and generation of self-similar vbr video traffic , 1994, SIGCOMM 1994.

[23]  Walter Willinger,et al.  On the self-similar nature of Ethernet traffic , 1993, SIGCOMM '93.