Properties and evolution of internet traffic networks from anonymized flow data. Meiss, M., Menczer, F., & Vespignani, A. ACM Transactions on Internet Technology, 2011. Website doi abstract bibtex 1 download Many projects have tried to analyze the structure and dynamics of application overlay networks on the Internet using packet analysis and network flow data. While such analysis is essential for a variety of network management and security tasks, it is infeasible on many networks: either the volume of data is so large as to make packet inspection intractable, or privacy concerns forbid packet capture and require the dissociation of network flows from users' actual IP addresses. Our analytical framework permits useful analysis of network usage patterns even under circumstances where the only available source of data is anonymized flow records. Using this data, we are able to uncover distributions and scaling relations in host-to-host networks that bear implications for capacity planning and network application design. We also show how to classify network applications based entirely on topological properties of their overlay networks, yielding a taxonomy that allows us to accurately identify the functions of unknown applications. We repeat this analysis on a more recent dataset, allowing us to demonstrate that the aggregate behavior of users is remarkably stable even as the population changes. © 2011 ACM.
@article{
title = {Properties and evolution of internet traffic networks from anonymized flow data},
type = {article},
year = {2011},
keywords = {Application identification; Application networks;,Computer aided network analysis; Data flow analys,Network management},
volume = {10},
websites = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-79953246500&doi=10.1145%2F1944339.1944342&partnerID=40&md5=1e1b8146f2b00c7210412d36c5e508b8},
id = {c929e99e-d06d-3d12-9fa9-966328000713},
created = {2018-01-16T17:54:28.625Z},
file_attached = {false},
profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d},
last_modified = {2018-03-12T19:03:19.167Z},
read = {false},
starred = {false},
authored = {true},
confirmed = {true},
hidden = {false},
citation_key = {Meiss2011},
source_type = {article},
notes = {cited By 4},
folder_uuids = {971e10ae-b1f7-4c4b-8f99-aa55f77a64f6},
private_publication = {false},
abstract = {Many projects have tried to analyze the structure and dynamics of application overlay networks on the Internet using packet analysis and network flow data. While such analysis is essential for a variety of network management and security tasks, it is infeasible on many networks: either the volume of data is so large as to make packet inspection intractable, or privacy concerns forbid packet capture and require the dissociation of network flows from users' actual IP addresses. Our analytical framework permits useful analysis of network usage patterns even under circumstances where the only available source of data is anonymized flow records. Using this data, we are able to uncover distributions and scaling relations in host-to-host networks that bear implications for capacity planning and network application design. We also show how to classify network applications based entirely on topological properties of their overlay networks, yielding a taxonomy that allows us to accurately identify the functions of unknown applications. We repeat this analysis on a more recent dataset, allowing us to demonstrate that the aggregate behavior of users is remarkably stable even as the population changes. © 2011 ACM.},
bibtype = {article},
author = {Meiss, M and Menczer, F and Vespignani, A},
doi = {10.1145/1944339.1944342},
journal = {ACM Transactions on Internet Technology},
number = {4}
}
Downloads: 1
{"_id":"WsN3p7uZMnztK5ZFR","bibbaseid":"meiss-menczer-vespignani-propertiesandevolutionofinternettrafficnetworksfromanonymizedflowdata-2011","downloads":1,"creationDate":"2015-10-30T13:52:19.679Z","title":"Properties and evolution of internet traffic networks from anonymized flow data","author_short":["Meiss, M.","Menczer, F.","Vespignani, A."],"year":2011,"bibtype":"article","biburl":"https://bibbase.org/service/mendeley/42d295c0-0737-38d6-8b43-508cab6ea85d","bibdata":{"title":"Properties and evolution of internet traffic networks from anonymized flow data","type":"article","year":"2011","keywords":"Application identification; Application networks;,Computer aided network analysis; Data flow analys,Network management","volume":"10","websites":"https://www.scopus.com/inward/record.uri?eid=2-s2.0-79953246500&doi=10.1145%2F1944339.1944342&partnerID=40&md5=1e1b8146f2b00c7210412d36c5e508b8","id":"c929e99e-d06d-3d12-9fa9-966328000713","created":"2018-01-16T17:54:28.625Z","file_attached":false,"profile_id":"42d295c0-0737-38d6-8b43-508cab6ea85d","last_modified":"2018-03-12T19:03:19.167Z","read":false,"starred":false,"authored":"true","confirmed":"true","hidden":false,"citation_key":"Meiss2011","source_type":"article","notes":"cited By 4","folder_uuids":"971e10ae-b1f7-4c4b-8f99-aa55f77a64f6","private_publication":false,"abstract":"Many projects have tried to analyze the structure and dynamics of application overlay networks on the Internet using packet analysis and network flow data. While such analysis is essential for a variety of network management and security tasks, it is infeasible on many networks: either the volume of data is so large as to make packet inspection intractable, or privacy concerns forbid packet capture and require the dissociation of network flows from users' actual IP addresses. Our analytical framework permits useful analysis of network usage patterns even under circumstances where the only available source of data is anonymized flow records. Using this data, we are able to uncover distributions and scaling relations in host-to-host networks that bear implications for capacity planning and network application design. We also show how to classify network applications based entirely on topological properties of their overlay networks, yielding a taxonomy that allows us to accurately identify the functions of unknown applications. We repeat this analysis on a more recent dataset, allowing us to demonstrate that the aggregate behavior of users is remarkably stable even as the population changes. © 2011 ACM.","bibtype":"article","author":"Meiss, M and Menczer, F and Vespignani, A","doi":"10.1145/1944339.1944342","journal":"ACM Transactions on Internet Technology","number":"4","bibtex":"@article{\n title = {Properties and evolution of internet traffic networks from anonymized flow data},\n type = {article},\n year = {2011},\n keywords = {Application identification; Application networks;,Computer aided network analysis; Data flow analys,Network management},\n volume = {10},\n websites = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-79953246500&doi=10.1145%2F1944339.1944342&partnerID=40&md5=1e1b8146f2b00c7210412d36c5e508b8},\n id = {c929e99e-d06d-3d12-9fa9-966328000713},\n created = {2018-01-16T17:54:28.625Z},\n file_attached = {false},\n profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d},\n last_modified = {2018-03-12T19:03:19.167Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Meiss2011},\n source_type = {article},\n notes = {cited By 4},\n folder_uuids = {971e10ae-b1f7-4c4b-8f99-aa55f77a64f6},\n private_publication = {false},\n abstract = {Many projects have tried to analyze the structure and dynamics of application overlay networks on the Internet using packet analysis and network flow data. While such analysis is essential for a variety of network management and security tasks, it is infeasible on many networks: either the volume of data is so large as to make packet inspection intractable, or privacy concerns forbid packet capture and require the dissociation of network flows from users' actual IP addresses. Our analytical framework permits useful analysis of network usage patterns even under circumstances where the only available source of data is anonymized flow records. Using this data, we are able to uncover distributions and scaling relations in host-to-host networks that bear implications for capacity planning and network application design. We also show how to classify network applications based entirely on topological properties of their overlay networks, yielding a taxonomy that allows us to accurately identify the functions of unknown applications. We repeat this analysis on a more recent dataset, allowing us to demonstrate that the aggregate behavior of users is remarkably stable even as the population changes. © 2011 ACM.},\n bibtype = {article},\n author = {Meiss, M and Menczer, F and Vespignani, A},\n doi = {10.1145/1944339.1944342},\n journal = {ACM Transactions on Internet Technology},\n number = {4}\n}","author_short":["Meiss, M.","Menczer, F.","Vespignani, A."],"urls":{"Website":"https://www.scopus.com/inward/record.uri?eid=2-s2.0-79953246500&doi=10.1145%2F1944339.1944342&partnerID=40&md5=1e1b8146f2b00c7210412d36c5e508b8"},"biburl":"https://bibbase.org/service/mendeley/42d295c0-0737-38d6-8b43-508cab6ea85d","bibbaseid":"meiss-menczer-vespignani-propertiesandevolutionofinternettrafficnetworksfromanonymizedflowdata-2011","role":"author","keyword":["Application identification; Application networks;","Computer aided network analysis; Data flow analys","Network management"],"metadata":{"authorlinks":{}},"downloads":1},"search_terms":["properties","evolution","internet","traffic","networks","anonymized","flow","data","meiss","menczer","vespignani"],"keywords":["application identification; application networks;","computer aided network analysis; data flow analys","network management"],"authorIDs":[],"dataSources":["zgahneP4uAjKbudrQ","ya2CyA73rpZseyrZ8","DcbWmAC2JLmqfNqRp","Ps6g2y4PPCZoC6Ywu","2252seNhipfTmjEBQ"]}