Reducing Network Traffic Data Sets

In the study of network traffic, the collection and the processing of measurement data sets play a fundamental role. Due to the large size of typical traffic traces, their analysis is often heavy in terms of computational time and resources. In addition, even when the data sets are small, due to the intrinsic redundancy of the data, there is no need to consider the entire data sets in the processing stages. To cope with these issues, we use an entropy-based methodology to reduce network traffic data sets obtained by measurements over real networks. The off-line approach we used is based on the marginal utility concept, and reveals encouraging results when applied to real data captured over real networks, especially when dealing with large amounts of data. To show the applicability of our approach, we present and discuss results obtained in the analysis and characterization, at packet-level, of traffic traces from two popular network games: Counter-Strike and Age of Mythology. Thanks to the differences between the two considered on-line games and their traffic traces we can draw pros and cons in realistic scenarios.

[1]  Alberto Dainotti,et al.  An HMM Approach to Internet Traffic Modeling , 2006 .

[2]  Azer Bestavros,et al.  On the marginal utility of network topology measurements , 2001, IMW '01.

[3]  Alfred O. Hero,et al.  Manifold learning visualization of network traffic data , 2005, MineNet '05.

[4]  kc claffy,et al.  Application of sampling methodologies to network traffic characterization , 1993, SIGCOMM 1993.

[5]  Mark Claypool,et al.  The effect of latency on user performance in Real-Time Strategy games , 2005, Comput. Networks.

[6]  Wu-chi Feng,et al.  Provisioning on-line games: a traffic analysis of a busy counter-strike server , 2002, Comput. Commun. Rev..

[7]  Dennis Goeckel,et al.  An information theoretic approach to network trace compression , 2004 .

[8]  Donald F. Towsley,et al.  An information-theoretic approach to network monitoring and measurement , 2005, IMC '05.

[9]  Jennifer C. Hou,et al.  An In-Depth, Analytical Study of Sampling Techniques for Self-Similar Internet Traffic , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).

[10]  Alberto Dainotti,et al.  A packet-level traffic model of Starcraft , 2005 .

[11]  Wu-chi Feng,et al.  Provisioning on-line games: a traffic analysis of a busy counter-strike server , 2002, CCRV.

[12]  Antonio Pescapè Entropy-Based Reduction of Traffic Data , 2007, IEEE Communications Letters.

[13]  Nicolas Hohn,et al.  Inverting sampled traffic , 2003, IEEE/ACM Transactions on Networking.

[14]  Wu-chi Feng,et al.  A traffic characterization of popular on-line games , 2005, IEEE/ACM Transactions on Networking.

[15]  Mika Ilvesmäki,et al.  The length of measurement period to determine the application profile for traffic classification in the Internet , 2001, ICC 2001. IEEE International Conference on Communications. Conference Record (Cat. No.01CH37240).

[16]  K. Claffy,et al.  Trends in wide area IP traffic patterns - A view from Ames Internet Exchange , 2000 .

[17]  Antonio Pescapè,et al.  A packet-level characterization of network traffic , 2006, 2006 11th International Workshop on Computer-Aided Modeling, Analysis and Design of Communication Links and Networks.

[18]  Mark Claypool,et al.  Game server selection for multiple players , 2005, NetGames '05.

[19]  kc claffy,et al.  Application of sampling methodologies to wide-area network traffic characterization , 1993, Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication.

[20]  Sang Joon Kim,et al.  A Mathematical Theory of Communication , 2006 .

[21]  Mark Claypool,et al.  Network analysis of Counter-strike and Starcraft , 2003, Conference Proceedings of the 2003 IEEE International Performance, Computing, and Communications Conference, 2003..

[22]  Carsten Lund,et al.  Estimating point-to-point and point-to-multipoint traffic matrices: an information-theoretic approach , 2005, IEEE/ACM Transactions on Networking.

[23]  Ling Huang,et al.  Toward sophisticated detection with distributed triggers , 2006, MineNet '06.

[24]  Patrice Abry,et al.  A Wavelet-Based Joint Estimator of the Parameters of Long-Range Dependence , 1999, IEEE Trans. Inf. Theory.