Skip to main content

Abstract

This chapter takes you on a journey on Internet traffic, from understanding its profile (i.e., by modeling and analysis) to generating packets or flows (either real or synthetic), in diverse environments. Usual decision network engineers and researchers find when designing performance evaluation experimental plans that are concerned with traffic generation. Suppose that you have measured and collected sufficient Internet traffic in your core network to derive a statistical model of the aggregate traffic. Now you want to use such analytical model for traffic prediction or capacity planning purposes in another what-if (a.k.a. sensitivity) analysis scenarios [14], via Systems Operational Dependency Analysis (SODA), for example [13]. If your further analysis will be conducted in a simulation environment, you either need to use the available models or to bring your traffic model into the environment as accurate as possible. If your sensitivity analysis will be done in a test bed, you have to assess the adequacy of your hardware- or software-based traffic generator. Sections 4.1 and 4.2 provide an overview of traffic analysis by looking at recent advances in traffic identification and classification and then discussing techniques and tools to effectively profile network traffic in a scalable fashion. Section 4.3 provides some examples of models that can be used to generate traffic. It is worth emphasizing that both traffic analysis and traffic modeling are very broad fields of investigation. Section 4.3 also deals with workload generation. There is a particular interest in methods that effectively and efficiently mimic network traffic in a certain layer of the Internet protocol stack. Last, but not the least, Sect. 4.4 discusses the world of simulation and emulation of computer network protocols and services. There is a massive amount of material in these topics that makes it impossible to condense them into a single book chapter. However, there will be lots of references, so the interested reader can delve into.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Merriam-Webster – Full Definition of identification – a: an act of identifying, the state of being identified; b: evidence of identity; http://www.merriam-webster.com/dictionary/identification .

  2. 2.

    Merriam-Webster – Full Definition of classification – a: the act or process of classifying; b: systematic arrangement in groups or categories according to established criteria; http://www.merriam-webster.com/dictionary/classification .

  3. 3.

    www.netflix.com .

  4. 4.

    www.hulu.com .

  5. 5.

    www.akamai.com .

  6. 6.

    At the time of writing this chapter.

  7. 7.

    Term coined by SolarWind: Mohan, V., “Deep Packet Inspection: Unearthing Gold in Network Packets,” March 2014, available at https://thwack.solarwinds.com/community/solarwinds-community/geek-speak_tht/blog/2014/03/06/deep-packet-inspection-unearthing-gold-in-network-packets.

  8. 8.

    NTOP’s PF_RING (http://www.ntop.org/products/packet-capture/pf_ring/).

  9. 9.

    The genius of DAG – May 2016, http://www.endace.com/endace-dag-high-speed-packet-capture-cards.html.

  10. 10.

    https://support.skype.com/en/faq/fa31/does-skype-use-encryption.

  11. 11.

    Policy Traffic Switch (PTS) – available at https://www.sandvine.com/platform/policy-traffic-switch.html, accessed May 2016.

  12. 12.

    Cisco Application Visibility and Control (AVC) – http://www.cisco.com/c/en/us/products/routers/avc_control.html .

  13. 13.

    e.g., Nallatech’s FPGA network processing cards, http://www.nallatech.com/solutions/fpga-network-processing/, May 2016.

  14. 14.

    Cavium’s NITROX DPI L7 Content Processor Family, http://www.cavium.com/processor_NITROX-DPI.html, May 2016.

  15. 15.

    Broadcom’s 20 Gbps NETL7™ Knowledge-Based Processor, product code: NLS2008, http://www.broadcom.com/products/enterprise-and-network-processors/knowledge-based-processors/nls2008 .

  16. 16.

    http://netfpga.org/site/#/about/.

  17. 17.

    PF_RING API Revision:7479, API documentation for PF_RING: high-speed packet capture, filtering, and analysis framework. http://www.ntop.org/pfring_api/files.html, available May 16, 2016.

  18. 18.

    http://www.ntop.org/products/deep-packet-inspection/ndpi/.

  19. 19.

    https://code.google.com/archive/p/opendpi/.

  20. 20.

    It was supposed to be a (horrible) pun, but indeed the term exists. Fort Collins-Loveland Municipal Airport (Northern Colorado) has used this term in its “Capacity Analysis and Facility Requirements” report, available at http://www.fortloveair.com/ .

  21. 21.

    Definitions of managed objects for IP Flow Information Export – RFC 5815 – https://datatracker.ietf.org/doc/rfc5815/.

  22. 22.

    Which is like the De Caprio’s Inception movie, since now I am classifying the classifiers.

  23. 23.

    www.sandvine.com .

  24. 24.

    www.proceranetworks.com .

  25. 25.

    www.allot.com .

  26. 26.

    www.solarwinds.com .

  27. 27.

    www.ipoque.com .

  28. 28.

    www.snort.org .

  29. 29.

    www.snort.org/integrators .

  30. 30.

    suricata-ids.org .

  31. 31.

    www.ntop.org .

  32. 32.

    I’m pretty sure there is a reality TV show related to this type of scene.

  33. 33.

    Spirent’s appliances: www.spirent.com/Products/TestCenter/Platforms/Appliances .

  34. 34.

    Spirent’s modules: www.spirent.com/Products/TestCenter/Platforms/Modules .

  35. 35.

    IxLoad: www.ixiacom.com/products/ixload .

  36. 36.

    Ixia’s PerfectStorm Family: www.ixiacom.com/products-services/ixia-test-hardware-products .

  37. 37.

    There are different iperf versions available. iperfv3 has been recently developed and is maintained by ESnet. It is available at https://github.com/esnet/iperf.

  38. 38.

    https://www.youtube.com/watch?v=eHkxmJ88Vsc .

  39. 39.

    www.linuxfoundation.org/collaborate/workgroups/networking/netem .

  40. 40.

    wanem.sourceforge.net/ .

  41. 41.

    IEEE Std 610.12 – 1990 IEEE Standard Glossary of Software Engineering Terminology.

  42. 42.

    1730–2010 – IEEE Recommended Practice for Distributed Simulation Engineering and Execution Process.

  43. 43.

    Information for Real-World Pilots – An aid for training and proficiency: available at https://www.microsoft.com/Products/Games/FSInsider/product/Pages/InfoRealworld.aspx .

  44. 44.

    “Does flight simulation prepare pilots for flying a real plane?”, 14 Oct 2013, available at https://flyawaysimulation.com/news/4492/ .

  45. 45.

    The Wachowskis’ The Matrix Movie – 1999.

  46. 46.

    Merriam-Webster definition of simulacrum: http://www.merriam-webster.com/dictionary/simulacrum.

  47. 47.

    “What Are the Odds We Are Living in a Computer Simulation?” by Joshua Rothman, The New Yorker, June 9, 2016, http://www.newyorker.com/books/joshua-rothman/what-are-the-odds-we-are-living-in-a-computer-simulation .

  48. 48.

    http://www.ieeecss.org/technical-activities/discrete-event-systems .

  49. 49.

    www.isi.edu/nsnam/ns .

  50. 50.

    www.omnetpp.org .

  51. 51.

    http://web.scalable-networks.com/content/qualnet .

  52. 52.

    http://www.riverbed.com/products/steelcentral/steelcentral-riverbed-modeler.html .

  53. 53.

    http://www.estinet.com/ .

References

  1. Economides, Nicholas, and Joacim Tåg. 2012. Network neutrality on the internet: A two-sided market analysis. Information Economics and Policy 24 (2): 91–104.

    Article  Google Scholar 

  2. Krämer, Jan, and Lukas Wiewiorra. 2012. Network neutrality and congestion sensitive content providers: Implications for content variety, broadband investment, and regulation. Information Systems Research 23 (4): 1303–1321.

    Article  Google Scholar 

  3. Kanuparthy, Partha, and Constantine Dovrolis. ShaperProbe: End-to-end detection of ISP traffic shaping using active methods. Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference. ACM, 2011.

    Google Scholar 

  4. Dischinger, Marcel, et al. Glasnost: Enabling end users to detect traffic differentiation. NSDI. 2010.

    Google Scholar 

  5. Gupta, Mukta, Joel Sommers, and Paul Barford. Fast, accurate simulation for SDN prototyping. Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking. ACM, 2013.

    Google Scholar 

  6. Yao, Wei-Min, and Sonia Fahmy. 2014. Flow-based partitioning of network testbed experiments. Computer Networks 58: 141–157.

    Article  Google Scholar 

  7. Gupta, Mukta, et al. pfs: Parallelized, flow-based network simulation. Proceedings of the International Symposium on Performance Evaluation of Computer and Telecommunication Systems. Society for Computer Simulation International, 2015.

    Google Scholar 

  8. Chertov, Roman, and Sonia Fahmy. Forwarding devices: From measurements to simulations. ACM Transactions on Modeling and Computer Simulation (TOMACS) 21.2 (2011): 12.

    Google Scholar 

  9. Vishwanath, Kashi Venkatesh, and Amin Vahdat. 2009. Swing: Realistic and responsive network traffic generation. IEEE/ACM Transactions on Networking 17 (3): 712–725.

    Article  Google Scholar 

  10. Hafsaoui, Aymen, Navid Nikaein, and Christian Bonnet. Analysis and experimentation with a realistic traffic generation tool for emerging application scenarios. Proceedings of the 6th International ICST Conference on Simulation Tools and Techniques. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), 2013.

    Google Scholar 

  11. Za.k.a.y, Netanel, and Dror G. Feitelson. Workload resampling for performance evaluation of parallel job schedulers. Concurrency and Computation: Practice and Experience 26.12 (2014): 2079–2105.

    Google Scholar 

  12. Sommers, Joel, and Paul Barford. Self-configuring network traffic generation. Proceedings of the 4th ACM SIGCOMM conference on Internet measurement. ACM, 2004.

    Google Scholar 

  13. Vishwanath, Kashi Venkatesh, and Amin Vahdat. Evaluating distributed systems: Does background traffic matter?. USENIX annual technical conference. 2008.

    Google Scholar 

  14. Guariniello, Cesare, and Daniel DeLaurentis. 2016. Supporting design via the system operational dependency analysis methodology. Research in Engineering Design: 1–17.

    Google Scholar 

  15. Hummel, Karin Anna, Helmut Hlavacs, and Wilfried Gansterer, eds. Performance evaluation of computer and communication systems. Milestones and future challenges: IFIP WG 6.3/7.3 International Workshop, PERFORM 2010, in Honor of Günter Haring on the Occasion of His Emeritus Celebration, Vienna, Austria, October 14–16, 2010, Revised Selected Papers. Vol. 6821. Springer Science & Business Media, 2011.

    Google Scholar 

  16. Callado, Arthur, et al. 2009. A survey on internet traffic identification. IEEE Communication Surveys and Tutorials 11 (3): 37–52.

    Article  Google Scholar 

  17. Nguyen, T.T. Thuy, and Grenville Armitage. 2008. A survey of techniques for internet traffic classification using machine learning. IEEE Communication Surveys and Tutorials 10 (4): 56–76.

    Article  Google Scholar 

  18. Finsterbusch, Michael, et al. 2014. A survey of payload-based traffic classification approaches. IEEE Communication Surveys and Tutorials 16 (2): 1135–1156.

    Article  Google Scholar 

  19. Dainotti, Alberto, Antonio Pescape, and Kimberly C. Claffy. 2012. Issues and future directions in traffic classification. IEEE Network 26 (1): 35–40.

    Article  Google Scholar 

  20. Tongaonkar, Alok, et al. 2015. Towards self adaptive network traffic classification. Computer Communications 56: 35–46.

    Article  Google Scholar 

  21. Zhang, Jun, et al. 2013. Unsupervised traffic classification using flow statistical properties and IP packet payload. Journal of Computer and System Sciences 79 (5): 573–585.

    Article  MathSciNet  Google Scholar 

  22. Fahad, Adil, et al. 2013. Toward an efficient and scalable feature selection approach for internet traffic classification. Computer Networks 57 (9): 2040–2057.

    Article  Google Scholar 

  23. Zhang, Hongli, et al. 2012. Feature selection for optimizing traffic classification. Computer Communications 35 (12): 1457–1471.

    Article  Google Scholar 

  24. Cherry, Steven. 2005. The VoIP backlash. IEEE Spectrum 42 (10): 61–63.

    Article  Google Scholar 

  25. Santiago del Rio, Pedro M., et al. Wire-speed statistical classification of network traffic on commodity hardware. Proceedings of the 2012 ACM conference on Internet measurement conference. ACM, 2012.

    Google Scholar 

  26. Szabó, Géza, et al. Traffic classification over Gbit speed with commodity hardware. IEEE J. Communications Software and Systems 5 (2010).

    Google Scholar 

  27. Zhou, Shijie, Prashant Rao Nittoor, and Viktor K. Prasanna. High-performance traffic classification on gpu. Computer architecture and high performance computing (SBAC-PAD), 2014 IEEE 26th International Symposium on. IEEE, 2014.

    Google Scholar 

  28. Fernandes, Stênio, et al. Slimming down deep packet inspection systems. INFOCOM Workshops 2009, IEEE. IEEE, 2009.

    Google Scholar 

  29. Hullár, Béla, Sándor Laki, and András György. 2014. Efficient methods for early protocol identification. IEEE Journal on Selected Areas in Communications 32 (10): 1907–1918.

    Google Scholar 

  30. Bujlow, Tomasz, Valentín Carela-Español, and Pere Barlet-Ros. 2015. Independent comparison of popular DPI tools for traffic classification. Computer Networks 76: 75–89.

    Article  Google Scholar 

  31. Lin, Po-Ching, et al. Using string matching for deep packet inspection. Computer 41.4 (2008): 23 − +.

    Google Scholar 

  32. Ahmad, Ijaz, et al. 2015. Security in software defined networks: A survey. IEEE Communication Surveys and Tutorials 17 (4): 2317–2346.

    Article  Google Scholar 

  33. Adami, Davide, et al. Towards an SDN network control application for differentiated traffic routing. 2015 IEEE International Conference on Communications (ICC). IEEE, 2015.

    Google Scholar 

  34. Bouet, Mathieu, et al. 2015. Cost-based placement of vDPI functions in NFV infrastructures. International Journal of Network Management 25 (6): 490–506.

    Article  Google Scholar 

  35. Xu, Chengcheng, et al. A survey on regular expression matching for deep packet inspection: Applications, algorithms and hardware platforms.

    Google Scholar 

  36. Shahbar, Khalid, and A. Nur Zincir-Heywood. Benchmarking two techniques for Tor classification: Flow level and circuit level classification. Computational Intelligence in Cyber Security (CICS), 2014 IEEE Symposium on. IEEE, 2014.

    Google Scholar 

  37. Lin, Ying-Dar, et al. 2009. Hardware-software codesign for high-speed signature-based virus scanning. IEEE Micro 29 (5): 56–65.

    Article  Google Scholar 

  38. Nickolls, John, et al. 2008. Scalable parallel programming with CUDA. Quest 6 (2): 40–53.

    Google Scholar 

  39. Cook, Shane. CUDA programming: A developer’s guide to parallel computing with GPUs. Newnes, 2012.

    Google Scholar 

  40. Lee, Chun-Liang, Yi-Shan Lin, and Yaw-Chung Chen. 2015. A hybrid CPU/GPU pattern-matching algorithm for deep packet inspection. PloS One 10 (10): e0139301.

    Article  Google Scholar 

  41. Cascarano, Niccolo, et al. 2010. iNFAnt: NFA pattern matching on GPGPU devices. ACM SIGCOMM Computer Communication Review 40 (5): 20–26.

    Article  Google Scholar 

  42. Hsieh, Cheng-Liang, Lucas Vespa, and Ning Weng. 2016. A high-throughput DPI engine on GPU via algorithm/implementation co-optimization. Journal of Parallel and Distributed Computing 88: 46–56.

    Article  Google Scholar 

  43. Intel, White Paper. Improving Network Performance in Multi-Core Systems. http://www.intel.com/content/dam/support/us/en/documents/network/sb/318483001us2.pdf. Accessed August 2016

  44. Moreno, Victor, et al. 2015. Commodity packet capture engines: Tutorial, cookbook and applicability. IEEE Communication Surveys and Tutorials 17 (3): 1364–1390.

    Article  Google Scholar 

  45. Karagiannis, Thomas, Konstantina Papagiannaki, and Michalis Faloutsos. 2005. BLINC: Multilevel traffic classification in the dark. ACM SIGCOMM Computer Communication Review 35 (4): 229–240.

    Article  Google Scholar 

  46. Conti, Mauro, et al. 2016. Analyzing android encrypted network traffic to identify user actions. IEEE Transactions on Information Forensics and Security 11 (1): 114–125.

    Article  Google Scholar 

  47. Wang, Yong, Wenlong Ke, and Xiaoling Tao. 2016. A feature selection method for large-scale network traffic classification based on spark. Infection 7 (1): 6.

    Google Scholar 

  48. Fahad, Adil, et al. 2014. An optimal and stable feature selection approach for traffic classification based on multi-criterion fusion. Future Generation Computer Systems 36: 156–169.

    Article  Google Scholar 

  49. Jaber, Mohamad, Roberto G. Cascella, and Chadi Bara.k.a.t. Using host profiling to refine statistical application identification. INFOCOM, 2012 Proceedings IEEE. IEEE, 2012.

    Google Scholar 

  50. Zhang, Jun, et al. 2015. Robust network traffic classification. IEEE/ACM Transactions on Networking 23 (4): 1257–1270.

    Article  Google Scholar 

  51. Alshammari, Riyad, and A. Nur Zincir-Heywood. An investigation on the identification of VoIP traffic: Case study on Gtalk and Skype. 2010 International Conference on Network and Service Management. IEEE, 2010.

    Google Scholar 

  52. Haddadi, Fariba, et al. Botnet behaviour analysis using ip flows: With http filters using classifiers. Advanced Information Networking and Applications Workshops (WAINA), 2014 28th International Conference on. IEEE, 2014.

    Google Scholar 

  53. Baer, Arian, et al. DBStream: A holistic approach to large-scale network traffic monitoring and analysis. Computer Networks (2016).

    Google Scholar 

  54. Karagiannis, Thomas, et al. Is p2p dying or just hiding?[p2p traffic measurement]. Global telecommunications conference, 2004. GLOBECOM’04. IEEE. Vol. 3. IEEE, 2004.

    Google Scholar 

  55. James, Gareth, et al. 2013. An introduction to statistical learning. Vol. 6. New York: springer.

    Book  Google Scholar 

  56. John Lu, Z.Q. 2010. The elements of statistical learning: Data mining, inference, and prediction. Journal of the Royal Statistical Society: Series A (Statistics in Society) 173 (3): 693–694.

    Article  Google Scholar 

  57. Vapnik, Vladimir. The nature of statistical learning theory. Springer Science & Business Media, 2013.

    Google Scholar 

  58. Callado, Arthur, et al. 2010. Better network traffic identification through the independent combination of techniques. Journal of Network and Computer Applications 33 (4): 433–446.

    Article  Google Scholar 

  59. Casas, Pedro, Johan Mazel, and Philippe Owezarski. MINETRAC: Mining flows for unsupervised analysis & semi-supervised classification. Proceedings of the 23rd International Teletraffic Congress. International Teletraffic Congress, 2011.

    Google Scholar 

  60. de Souza, Erico N., Stan Matwin, and Stenio Fernandes. Network traffic classification using AdaBoost dynamic. 2013 IEEE International Conference on Communications Workshops (ICC). IEEE, 2013.

    Google Scholar 

  61. Zhang, Jun, et al. 2013. An effective network traffic classification method with unknown flow detection. IEEE Transactions on Network and Service Management 10 (2): 133–147.

    Article  MathSciNet  Google Scholar 

  62. ———. 2013. Network traffic classification using correlation information. IEEE Transactions on Parallel and Distributed Systems 24 (1): 104–117.

    Article  Google Scholar 

  63. Grimaudo, Luigi, et al. 2014. SeLeCT: Self-learning classifier for internet traffic. IEEE Transactions on Network and Service Management 11 (2): 144–157.

    Article  Google Scholar 

  64. Haddadi, Fariba, and A. Nur Zincir-Heywood. A closer look at the HTTP and P2P based botnets from a detector’s perspective. International symposium on foundations and practice of security. Springer International Publishing, 2015.

    Google Scholar 

  65. ———. Benchmarking the effect of flow exporters and protocol filters on botnet traffic classification. (2014).

    Google Scholar 

  66. Buczak, Anna L., and Erhan Guven. 2015. A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communication Surveys and Tutorials 18 (2): 1153–1176.

    Article  Google Scholar 

  67. Sandvine, “Internet Traffic Classification – A Sandvine Technology Showcase”, White Paper, https://www.sandvine.com/downloads/general/sandvine-technology-showcases/traffic-classification-identifying-and-measuring-internet-traffic.pdf. Accessed August 2016

  68. Team, Mininet. MiniNet. (2014).

    Google Scholar 

  69. Sommers, Joel, Hyungsuk Kim, and Paul Barford. Harpoon: A flow-level traffic generator for router and network tests. ACM SIGMETRICS Performance Evaluation Review. Vol. 32. No. 1. ACM, 2004.

    Google Scholar 

  70. Laurent, Nicolas, Stefano Vissicchio, and Marco Canini. SDLoad: An extensible framework for SDN workload generation. Proceedings of the third workshop on Hot topics in software defined networking. ACM, 2014.

    Google Scholar 

  71. Becchi, Michela, Mark Franklin, and Patrick Crowley. A workload for evaluating deep packet inspection architectures. Workload Characterization, 2008. IISWC 2008. IEEE International Symposium on. IEEE, 2008.

    Google Scholar 

  72. A Framework for Malicious Workload Generation, Joel Sommers, Vinod Yegneswaran, Paul Barford

    Google Scholar 

  73. Antonatos, Spyros, Kostas G. Anagnostakis, and Evangelos P. Markatos. Generating realistic workloads for network intrusion detection systems. ACM SIGSOFT Software Engineering Notes. Vol. 29. No. 1. ACM, 2004.

    Google Scholar 

  74. Valgenti, Victor C., and Min Sik Kim. Simulating content in traffic for benchmarking intrusion detection systems. Proceedings of the 4th International ICST Conference on Simulation Tools and Techniques. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), 2011.

    Google Scholar 

  75. Shiravi, Ali, et al. 2012. Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Computers & Security 31 (3): 357–374.

    Article  Google Scholar 

  76. Siska, Peter, et al. A flow trace generator using graph-based traffic classification techniques. Proceedings of the 6th International Wireless Communications and Mobile Computing Conference. ACM, 2010.

    Google Scholar 

  77. Sommers, Joel, et al. Efficient network-wide flow record generation. INFOCOM, 2011 Proceedings IEEE. IEEE, 2011.

    Google Scholar 

  78. Tang, Wenting, et al. Medisyn: A synthetic streaming media service workload generator. Proceedings of the 13th international workshop on Network and operating systems support for digital audio and video. ACM, 2003.

    Google Scholar 

  79. Summers, Jim, et al. Methodologies for generating HTTP streaming video workloads to evaluate web server performance. Proceedings of the 5th Annual International Systems and Storage Conference. ACM, 2012.

    Google Scholar 

  80. Mosberger, David, and Tai Jin. 1998. httperf—a tool for measuring web server performance. ACM SIGMETRICS Performance Evaluation Review 26 (3): 31–37.

    Article  Google Scholar 

  81. Pegus II, Patrick, Emmanuel Cecchet, and Prashant Shenoy. Video BenchLab: An open platform for realistic benchmarking of streaming media workloads. Proceedings of the 6th ACM Multimedia Systems Conference. ACM, 2015.

    Google Scholar 

  82. Botta, Alessio, Alberto Dainotti, and Antonio Pescapé. 2010. Do you trust your software-based traffic generator? IEEE Communications Magazine 48 (9): 158–165.

    Article  Google Scholar 

  83. Groléat, Tristan, et al. Flexible, extensible, open-source and affordable FPGA-based traffic generator. Proceedings of the first edition workshop on High performance and programmable networking. ACM, 2013.

    Google Scholar 

  84. Megyesi, Péter, Géza Szabó, and Sándor Molnár. 2015. User behavior based traffic emulator: A framework for generating test data for DPI tools. Computer Networks 92: 41–54.

    Article  Google Scholar 

  85. Leland, Will E., et al. 1994. On the self-similar nature of Ethernet traffic (extended version). IEEE/ACM Transactions on Networking 2 (1): 1–15.

    Article  Google Scholar 

  86. Willinger, Walter, et al. 1997. Self-similarity through high-variability: Statistical analysis of Ethernet LAN traffic at the source level. IEEE/ACM Transactions on Networking (ToN) 5 (1): 71–86.

    Article  Google Scholar 

  87. Li, Ting, and Jason Liu. Cluster-based spatiotemporal background traffic generation for network simulation. ACM Transactions on Modeling and Computer Simulation (TOMACS) 25.1 (2015): 4.

    Google Scholar 

  88. Paxson, Vern, et al. Computing TCP’s retransmission timer. No. RFC 6298. 2011.

    Google Scholar 

  89. Chertov, Roman, Sonia Fahmy, and Ness B. Shroff. Emulation versus simulation: A case study of TCP-targeted denial of service attacks. 2nd International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, 2006. Tridentcom 2006.. IEEE, 2006.

    Google Scholar 

  90. Zeigler, Bernard P. Discrete event system specification framework for self-improving healthcare service systems. (2016).

    Google Scholar 

  91. Tsai, Wei-Tek, Wu Li, Hessam Sarjoughian, and Qihong Shao. 2011. SimSaaS: Simulation software-as-a-service. In Proceedings of the 44th Annual Simulation Symposium(ANSS’11). Society for Computer Simulation International, San Diego, 77–86.

    Google Scholar 

  92. Banks, B. Carson, J.S.I.I. Nelson, and B.L. Nicol. 2001. DM discrete-event system simulation. Saddle River: 489–459.

    Google Scholar 

  93. Cassandras, Christos G., and Stephane Lafortune. 2009. Introduction to discrete event systems. Secaucus: Springer Science & Business Media.

    MATH  Google Scholar 

  94. IEEE standard glossary of modeling and simulation terminology - IEEE Std 61 03–1989

    Google Scholar 

  95. Zeigler, B.P. 1976. Theory of modeling and simulation. New York: John Wiley & Sons.

    MATH  Google Scholar 

  96. Concepcion, Arturo I., and B. F. Zeigler. DEVS formalism: A framework for hierarchical model development. IEEE Transactions on Software Engineering 14.2 (1988): 228.

    Google Scholar 

  97. Wainer, Gabriel A., and Pieter J. Mosterman, eds. 2010. Discrete-event modeling and simulation: Theory and applications. Boca Raton: CRC Press.

    Google Scholar 

  98. Gibbs, Jonathan Douglas. An approach to evaluating computer network simulation tool support for verification and validation. Diss. Master’s thesis, Arizona State University, Tempe, AZ, 2009.

    Google Scholar 

  99. Kruchten, Philippe. 2004. The rational unified process: An introduction. Boston: Addison-Wesley Professional.

    Google Scholar 

  100. Fujimoto, R. M., Perumalla, K. S., and Riley, G. F., Network simulation, synthesis lectures on communication networks 2006 1:1, 1–72

    Google Scholar 

  101. Altman, Eitan, and Tania Jimenez. 2012. NS simulator for beginners. Synthesis Lectures on Communication Networks 5 (1): 1–184.

    Article  Google Scholar 

  102. Małowidzki, Marek, et al. 2001. 01-Network Simulators: A developer’s perspective. ACM SIGCOMM Computer Communication Review 31 (2): 9–24.

    Article  Google Scholar 

  103. Garrido, P. Pablo, Manuel P. Malumbres, and Carlos T. Calafate. ns-2 vs. OPNET: A comparative study of the IEEE 802.11 e technology on MANET environments. Proceedings of the 1st international conference on Simulation tools and techniques for communications, networks and systems & workshops. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), 2008.

    Google Scholar 

  104. García-Dorado, José Luis, et al. 2013. High-performance network traffic processing systems using commodity hardware. In Data traffic monitoring and analysis, 3–27. Berlin/Heidelberg: Springer.

    Chapter  Google Scholar 

  105. Cellier, F., and E. Kofman. 2006. Discrete event simulation. In Continuous system simulation, 519–554. US: Springer.

    Google Scholar 

  106. Zeigler, B.P., H.S. Song, T.G. Kim, and H. Praehofer. 1995. In DEVS framework for modelling, simulation, analysis, and design of hybrid systems hybrid systems II, ed. P. Antsaklis, W. Kohn, A. Nerode, and S. Sastry, 529–551. Berlin/Heidelberg: Springer.

    Google Scholar 

  107. Bonaventura, MatÃas, Daniel Foguelman, and Rodrigo Castro. 2016. Discrete event modeling and simulation-driven engineering for the atlas data acquisition network. Computing in Science & Engineering 18 (3): 70–83.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this chapter

Cite this chapter

Fernandes, S. (2017). Internet Traffic Profiling. In: Performance Evaluation for Network Services, Systems and Protocols . Springer, Cham. https://doi.org/10.1007/978-3-319-54521-9_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-54521-9_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-54519-6

  • Online ISBN: 978-3-319-54521-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics