{"title":"VisVerND: Visual Verification of Network Traffic Dataset","authors":"John Felix Charles Joseph, A. Ghorbani","doi":"10.1109/CNSR.2011.17","DOIUrl":null,"url":null,"abstract":"Captured network traffic data is generally used to evaluate, validate and analyze novel solutions for various network problems. Hence, the quality and the completeness of the network traffic dataset are important for the analysis to yield correct results. However, the quality of the network traffic dataset is never questioned. In this work, we propose a systematic methodology to visually verify the quality and completeness of a network traffic dataset. The methodology analyzes the dataset for topological and protocol distribution properties and verifies whether it conforms to an ideal traffic dataset. It is observed that visual verification process helps to identify flawed and incomplete network traffic datasets.","PeriodicalId":272359,"journal":{"name":"2011 Ninth Annual Communication Networks and Services Research Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 Ninth Annual Communication Networks and Services Research Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CNSR.2011.17","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
Captured network traffic data is generally used to evaluate, validate and analyze novel solutions for various network problems. Hence, the quality and the completeness of the network traffic dataset are important for the analysis to yield correct results. However, the quality of the network traffic dataset is never questioned. In this work, we propose a systematic methodology to visually verify the quality and completeness of a network traffic dataset. The methodology analyzes the dataset for topological and protocol distribution properties and verifies whether it conforms to an ideal traffic dataset. It is observed that visual verification process helps to identify flawed and incomplete network traffic datasets.