[HTML][HTML] A survey on network data collection

D Zhou, Z Yan, Y Fu, Z Yao - Journal of Network and Computer …, 2018 - Elsevier
Networks have dramatically changed our daily life and infiltrated all aspects of human
society. At the same time when we enjoy the convenience and benefits brought by the …

Counter tree: A scalable counter architecture for per-flow traffic measurement

M Chen, S Chen, Z Cai - IEEE/ACM Transactions on …, 2016 - ieeexplore.ieee.org
Per-flow traffic measurement, which is to count the number of packets for each active flow
during a certain measurement period, has many applications in traffic engineering …

Per-flow traffic measurement through randomized counter sharing

T Li, S Chen, Y Ling - IEEE/ACM Transactions on Networking, 2012 - ieeexplore.ieee.org
Traffic measurement provides critical real-world data for service providers and network
administrators to perform capacity planning, accounting and billing, anomaly detection, and …

Probabilistic lossy counting: An efficient algorithm for finding heavy hitters

X Dimitropoulos, P Hurley, A Kind - ACM SIGCOMM Computer …, 2008 - dl.acm.org
Knowledge of the largest traffic ows in a network is important for many network management
applications. The problem of finding these ows is known as the heavy-hitter problem and …

Fast and compact per-flow traffic measurement through randomized counter sharing

T Li, S Chen, Y Ling - 2011 Proceedings IEEE INFOCOM, 2011 - ieeexplore.ieee.org
Traffic measurement provides critical real-world data for service providers and network
administrators to perform capacity planning, accounting and billing, anomaly detection, and …

Highly compact virtual active counters for per-flow traffic measurement

Y Zhou, Y Zhou, S Chen… - IEEE INFOCOM 2018-IEEE …, 2018 - ieeexplore.ieee.org
Per-flow traffic measurement is a fundamental problem in the era of big network data, and
has been widely used in many applications, including capacity planning, anomaly detection …

Super spreader identification using geometric-min filter

C Ma, S Chen, Y Zhang, Q Xiao… - IEEE/ACM Transactions …, 2021 - ieeexplore.ieee.org
Super spreader identification has a lot of applications in network management and security
monitoring. It is a more difficult problem than heavy hitter identification because flow spread …

Simple and adaptive identification of superspreaders by flow sampling

N Kamiyama, T Mori… - IEEE INFOCOM 2007-26th …, 2007 - ieeexplore.ieee.org
Abusive traffic caused by worms is increasing severely in the Internet. In many cases, worm-
infected hosts generate a huge number of flows of small size during a short time. To …

Understanding flows in high-speed scientific networks: A netflow data study

M Kiran, A Chhabra - Future Generation Computer Systems, 2019 - Elsevier
Complex science workflows involve very large data demands and resource-intensive
computations. These demands need reliable high-speed networks, that can optimize …

Jaal: Towards network intrusion detection at isp scale

A Aqil, K Khalil, AOF Atya, EE Papalexakis… - Proceedings of the 13th …, 2017 - dl.acm.org
We have recently seen an increasing number of attacks that are distributed, and span an
entire wide area network (WAN). Today, typically, intrusion detection systems (IDSs) are …