A Review of Network Traffic Analysis and Prediction Techniques

Analysis and prediction of network traffic has applications in wide comprehensive set of areas and has newly attracted significant number of studies. Different kinds of experiments are conducted and summarized to identify various problems in existing computer network applications. Network traffic analysis and prediction is a proactive approach to ensure secure, reliable and qualitative network communication. Various techniques are proposed and experimented for analyzing network traffic including neural network based techniques to data mining techniques. Similarly, various Linear and non-linear models are proposed for network traffic prediction. Several interesting combinations of network analysis and prediction techniques are implemented to attain efficient and effective results. This paper presents a survey on various such network analysis and traffic prediction techniques. The uniqueness and rules of previous studies are investigated. Moreover, various accomplished areas of analysis and prediction of network traffic have been summed.

[1]  Edmund S. Yu,et al.  Traffic prediction using neural networks , 1993, Proceedings of GLOBECOM '93. IEEE Global Telecommunications Conference.

[2]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[3]  Gowrishankar,et al.  A Time Series Modeling and Prediction of Wireless Network Traffic , 2009, Int. J. Interact. Mob. Technol..

[4]  Yingjie Yang,et al.  Research of Applying Information Entropy and Clustering Technique on Network Traffic Analysis , 2008, 2008 International Conference on Computational Intelligence and Security.

[5]  Wei Hu,et al.  Anomalous Network Packet Detection Using Data Stream Mining , 2011, J. Information Security.

[6]  Neetesh Gupta,et al.  A Novel Approach to Intrusion Detection System using Rough Set Theory and Incremental SVM , 2011 .

[7]  Hao Tu,et al.  Mining Network Traffic for Worm Signature Extraction , 2008, 2008 Fifth International Conference on Fuzzy Systems and Knowledge Discovery.

[8]  B. Raahemi,et al.  Classification of Peer-to-Peer traffic using incremental neural networks (Fuzzy ARTMAP) , 2008, 2008 Canadian Conference on Electrical and Computer Engineering.

[9]  Indra Bhan Arya,et al.  Internet Traffic Classification : An Enhancement in Performance using Classifiers Combination , 2011 .

[10]  Farhad Soleimanian Gharehchopogh,et al.  Evaluation of Fuzzy K-Means And K-Means Clustering Algorithms In Intrusion Detection Systems , 2012 .

[11]  Monark Bag,et al.  Cascading of C4.5 Decision Tree and Support Vector Machine for Rule Based Intrusion Detection System , 2012 .

[12]  Jiawei Han,et al.  Data Mining: Concepts and Techniques , 2000 .

[13]  Iftikhar Ahmad,et al.  Intrusion Detection Using PCA Based Modular Neural Network , 2012 .

[14]  Yogendra Kumar Jain,et al.  An Empirical Comparison and Feature Reduction Performance Analysis of Intrusion Detection , 2012 .

[15]  Hong Fei,et al.  Performance Impact of Wireless Mesh Networks with Mining Traffic Patterns , 2008, 2008 Fifth International Conference on Fuzzy Systems and Knowledge Discovery.

[16]  G Kalyani,et al.  Performance Assessment of Different Classification Techniques for Intrusion Detection , 2012 .

[17]  C. S. Ravichandran,et al.  Efficient Classifier for R2L and U2R Attacks , 2012 .

[18]  G. Rutka,et al.  Some Aspects of Traffic Analysis used for Internet Traffic Prediction , 2009 .

[19]  Kumar Shrivastava Shailendra,et al.  Effective Anomaly based Intrusion Detection using Rough Set Theory and Support Vector Machine , 2011 .

[20]  Guadalupe I. Janoski,et al.  Intrusion Detection : Support Vector Machines and Neural Networks , 2002 .

[21]  Hao Chen,et al.  Prediction of traffic in a public safety network , 2006, 2006 IEEE International Symposium on Circuits and Systems.

[22]  Rupali Datti,et al.  Feature Reduction for Intrusion Detection Using Linear Discriminant Analysis , 2010 .

[23]  Oliver W. W. Yang,et al.  Wireless traffic modeling and prediction using seasonal ARIMA models , 2003, IEEE International Conference on Communications, 2003. ICC '03..

[24]  Manas Ranjan Patra,et al.  NETWORK INTRUSION DETECTION USING NAÏVE BAYES , 2007 .

[25]  Balasubramaniam Natarajan,et al.  GARCH — non-linear time series model for traffic modeling and prediction , 2008, NOMS 2008 - 2008 IEEE Network Operations and Management Symposium.

[26]  Wang Peng,et al.  Network Traffic Prediction Based on Improved BP Wavelet Neural Network , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.

[27]  Jian Gong,et al.  A Time-Series Decomposed Model of Network Traffic , 2005, ICNC.

[28]  Rowayda A. Sadek,et al.  Effective Anomaly Intrusion Detection System based on Neural Network with Indicator Variable and Rou , 2013 .

[29]  Jilali Antari,et al.  Identification and Prediction of Internet Traffic Using Artificial Neural Networks , 2010, J. Intell. Learn. Syst. Appl..

[30]  Anirban Mahanti,et al.  Traffic classification using clustering algorithms , 2006, MineNet '06.

[31]  Alireza Khotanzad,et al.  Multi-scale high-speed network traffic prediction using k-factor Gegenbauer ARMA model , 2004, 2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577).

[32]  Ashraf Darwish,et al.  Principle components analysis and Support Vector Machine based Intrusion Detection System , 2010, 2010 10th International Conference on Intelligent Systems Design and Applications.

[33]  Miguel Rio,et al.  Internet Traffic Forecasting using Neural Networks , 2006, The 2006 IEEE International Joint Conference on Neural Network Proceedings.

[34]  Kanwal Garg,et al.  Determining feature set of DOS attacks , 2013 .

[35]  Chen Di,et al.  Multi-scale Internet Traffic Prediction Using Wavelet Neural Network Combined Model , 2006 .

[36]  Dong-Chul Park,et al.  Prediction of Network Traffic Using Dynamic Bilinear Recurrent Neural Network , 2009, 2009 Fifth International Conference on Natural Computation.

[37]  Yanhua Yu,et al.  Network traffic analysis and prediction based on APM , 2011, 2011 6th International Conference on Pervasive Computing and Applications.

[38]  Michael Neethu Classification of Intrusion Detection Dataset using machine learning Approaches , 2012 .

[39]  Shilpa Lakhina,et al.  Feature Reduction using Principal Component Analysis for Effective Anomaly – Based Intrusion Detection on NSL-KDD , 2010 .

[40]  F. Cuppens,et al.  Efficient Intrusion Detection Using Principal Component Analysis , 2003 .

[41]  Lizy Kurian John,et al.  Power and performance analysis of network traffic prediction techniques , 2012, 2012 IEEE International Symposium on Performance Analysis of Systems & Software.

[42]  Guangmin Hu,et al.  Analyze large-scale communication network behavior through mining TCP control segment information , 2009, 2009 International Conference on Communications, Circuits and Systems.

[43]  H.M.A. El Hag,et al.  An adjusted ARIMA model for internet traffic , 2007, AFRICON 2007.

[44]  A. Abraham,et al.  Intrusion Detection Systems Using Decision Trees and Support Vector Machines , 2004 .

[45]  Lei Shen,et al.  Prediction of Network Flow Based on Wavelet Analysis and ARIMA Model , 2009, 2009 International Conference on Wireless Networks and Information Systems.

[46]  Wei Zhang,et al.  An Engineering Approach to Prediction of Network Traffic Based on Time-Series Model , 2009, 2009 International Joint Conference on Artificial Intelligence.

[47]  Chen Di,et al.  Multi-scale Internet Traffic Prediction Using Wavelet Neural Network Combined Model , 2006, 2006 First International Conference on Communications and Networking in China.

[48]  Xiaohong Huang,et al.  Dynamic Online Traffic Classification Using Data Stream Mining , 2008, 2008 International Conference on MultiMedia and Information Technology.

[49]  Meina Song,et al.  Network Traffic Prediction and Result Analysis Based on Seasonal ARIMA and Correlation Coefficient , 2010, 2010 International Conference on Intelligent System Design and Engineering Application.

[50]  Mohammad Zulkernine,et al.  Anomaly Based Network Intrusion Detection with Unsupervised Outlier Detection , 2006, 2006 IEEE International Conference on Communications.

[51]  Xin Li,et al.  Frequent Itemsets Mining in Network Traffic Data , 2012, 2012 Fifth International Conference on Intelligent Computation Technology and Automation.

[52]  Sunil Agrawal,et al.  Internet Traffic Classification for Educational Institutions Using Machine Learning , 2012 .

[53]  Jilali Antari,et al.  ANFIS method for forecasting internet traffic time series , 2009, 2009 Mediterrannean Microwave Symposium (MMS).

[54]  Venkata Suneetha Takkellapati Network Intrusion Detection system based on Feature Selection and Triangle area Support Vector Machine , 2012 .

[55]  Wang Qian,et al.  A graph-based clustering algorithm for anomaly intrusion detection , 2012, 2012 7th International Conference on Computer Science & Education (ICCSE).

[56]  Mohamed Faten Zhani,et al.  Analysis and Prediction of Real Network Traffic , 2009, J. Networks.

[58]  R. Sivakumar,et al.  Prediction of Traffic Load in Wireless Network Using Time Series Model , 2011, 2011 International Conference on Process Automation, Control and Computing.

[59]  Poo Kuan Hoong,et al.  Impact of utilizing forecasted network traffic for data transfers , 2011, 13th International Conference on Advanced Communication Technology (ICACT2011).

[60]  Karel Mittig,et al.  Intrusion Detection Method , 2011 .

[61]  Kumar Jain Yogendra Intrusion Detection using Supervised Learning with Feature Set Reduction , 2011 .

[62]  Hong Zhao Multiscale analysis and prediction of network traffic , 2009, 2009 IEEE 28th International Performance Computing and Communications Conference.