Call for Paper - July 2022 Edition
IJCA solicits original research papers for the July 2022 Edition. Last date of manuscript submission is June 20, 2022. Read More

Network Traffic Measurements and Analysis using Hadoop

Print
PDF
IJCA Proceedings on National Conference on Advancements in Computer & Information Technology
© 2016 by IJCA Journal
NCACIT 2016 - Number 3
Year of Publication: 2016
Authors:
Amol S. Suryawanshi
S. V. Bodake

Amol S Suryawanshi and S v Bodake. Article: Network Traffic Measurements and Analysis using Hadoop. IJCA Proceedings on National Conference on Advancements in Computer & Information Technology NCACIT 2016(3):21-25, May 2016. Full text available. BibTeX

@article{key:article,
	author = {Amol S. Suryawanshi and S.v. Bodake},
	title = {Article: Network Traffic Measurements and Analysis using Hadoop},
	journal = {IJCA Proceedings on National Conference on Advancements in Computer & Information Technology},
	year = {2016},
	volume = {NCACIT 2016},
	number = {3},
	pages = {21-25},
	month = {May},
	note = {Full text available}
}

Abstract

Accurate network traffic capture & measurements, analysis and monitoring is key to a wide range of network applications such as computer network traffic engineering, error detection & correction and all kind of security analysis with maintaince. A number of critical network management decisions, such as identifying faulty nodes & servers, routers, blocking traffic to a victim destination, monitoring traffic require extraction and analysis of real time data patterns in network traffic. The large traffic volumes seen in today's high-speed networks pose tremendous computational and storage requirements for accurate traffic measurements & analysis. We are going to actualizing Hadoop based system which collect traffic data, perform Traffic Analysis, Measurement, and Classification with deference to different parameters at parcel level. These outcomes can be utilized by Network Administrator and ISP's to identify abnormalities in system to achieve efficiency.

References

  • IEEE Journal on Selected Areas in Communication, Vol. 32, No. 10, October 2014,"Stream-Oriented Network Traffic Capture and Analysis for High-Speed Networks" by Antonis Papadogiannakis, Michalis Polychronakis,and Evangelos P. Markatos.
  • Cisco White Paper. "Cisco Visual Networking Index: Forecast and Methodology", 2011-2016, May 2012.
  • S. Ghemawat, H. Gobio, and S. Leung,"The Google File System", ACM SOSP, 2003.
  • J. Dean and S. Ghemawat,"MapReduce: Simplified Data Processing on Large Cluster", USENIX OSDI, 2004.
  • Hadoop, http://hadoop. apache. org/.
  • T. White, Hadoop: The Definitive Guide, O'Reilly, Third ed. , 2012.
  • M. Roesch,"Snort: Lightweight intrusion detection for networks," in Proc. USENIX LISA Conf. , 1999, pp. 229-238.
  • V. Paxson,"Bro: A system for detecting network intruders in real-time," Comput. Netw. , vol. 31, no. 23/24, pp. 2435-2463, Dec. 1999.
  • G. Gu, P. Porras, V. Yegneswaran, M. Fong, and W. Lee,"BotHunter: Detecting malware infection through IDS-driven dialog correlation," in Proc. USENIX Security Symp. , 2007, pp. 167-182.
  • S. Singh, C. Estan, G. Varghese, and S. Savage,"Automated worm finger printing,"in Proc. USENIX Symp. OSDI, 2004, pp. 45-60.
  • Application Layer Packet Classifier for Linux (L7-Filter). [Online]. Available:http://l7-filter. sourceforge. net/.
  • IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 22, NO. 2, APRIL 2014 377 "Streaming Solutions for Fine-Grained Network Traffic Measurements and Analysis" Faisal Khan, Nicholas Hosein, Soheil Ghiasi, Senior Member, IEEE Chen-Nee Chuah, Senior Member, IEEE, and Puneet Sharma, Senior Member, IEEE.
  • "Hadoop-The Definitive Guide" -Tom White
  • "Data communications & Networking" –Forouzan
  • "Computer Networks"-A. S. Tanenbaum.