{"title":"实时多媒体流量的在线检测","authors":"F. Hao, M. Kodialam, T. V. Lakshman","doi":"10.1109/ICNP.2009.5339680","DOIUrl":null,"url":null,"abstract":"With the increasing volume of VoIP, IPTV, and other real-time traffic on the Internet in recent years, service providers and operators demand tools to effectively detect and manage such traffic in their networks. However, many such applications are not easy to detect by using conventional approaches based on packet header and payload inspections since they may use random ports and data encryption. In this paper, we propose a simple yet effective approach that can detect constant or near constant rate traffic based on statistical inference on packet timing behaviors. Through experiments with traffic collected from both lab controlled environment and actual field networks, we show that this approach is easier to implement and has much better performance compared to existing approaches.","PeriodicalId":439867,"journal":{"name":"2009 17th IEEE International Conference on Network Protocols","volume":"166 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"On-line detection of real time multimedia traffic\",\"authors\":\"F. Hao, M. Kodialam, T. V. Lakshman\",\"doi\":\"10.1109/ICNP.2009.5339680\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the increasing volume of VoIP, IPTV, and other real-time traffic on the Internet in recent years, service providers and operators demand tools to effectively detect and manage such traffic in their networks. However, many such applications are not easy to detect by using conventional approaches based on packet header and payload inspections since they may use random ports and data encryption. In this paper, we propose a simple yet effective approach that can detect constant or near constant rate traffic based on statistical inference on packet timing behaviors. Through experiments with traffic collected from both lab controlled environment and actual field networks, we show that this approach is easier to implement and has much better performance compared to existing approaches.\",\"PeriodicalId\":439867,\"journal\":{\"name\":\"2009 17th IEEE International Conference on Network Protocols\",\"volume\":\"166 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-11-20\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 17th IEEE International Conference on Network Protocols\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICNP.2009.5339680\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 17th IEEE International Conference on Network Protocols","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICNP.2009.5339680","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
With the increasing volume of VoIP, IPTV, and other real-time traffic on the Internet in recent years, service providers and operators demand tools to effectively detect and manage such traffic in their networks. However, many such applications are not easy to detect by using conventional approaches based on packet header and payload inspections since they may use random ports and data encryption. In this paper, we propose a simple yet effective approach that can detect constant or near constant rate traffic based on statistical inference on packet timing behaviors. Through experiments with traffic collected from both lab controlled environment and actual field networks, we show that this approach is easier to implement and has much better performance compared to existing approaches.