4.7 Article

Experiences of Internet Traffic Monitoring with Tstat

Journal

IEEE NETWORK
Volume 25, Issue 3, Pages 8-14

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/MNET.2011.5772055

Keywords

-

Funding

  1. European Commission [1 FP7-ICT-2007-1]

Ask authors/readers for more resources

Since the early days of the Internet, network traffic monitoring has always played a strategic role in understanding and characterizing users' activities. In this article, we present our experience in engineering and deploying Tstat, an open source passive monitoring tool that has been developed in the past 10 years. Started as a scalable tool to continuously monitor packets that flow on a link, Tstat has evolved into a complex application that gives network researchers and operators the possibility to derive extended and complex measurements thanks to advanced traffic classifiers. After discussing Tstat capabilities and internal design, we present some examples of measurements collected deploying Tstat at the edge of several ISP networks in past years. While other works report a continuous decline of P2P traffic with streaming and file hosting services rapidly increasing in popularity, the results presented in this article picture a different scenario. First, P2P decline has stopped, and in the last months of 2010 there was a counter tendency to increase P2P traffic over UDP, so the common belief that UDP traffic is negligible is not true anymore. Furthermore, streaming and file hosting applications have either stabilized or are experiencing decreasing traffic shares. We then discuss the scalability issues software-based tools have to cope with when deployed in real networks, showing the importance of properly identifying bottlenecks.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Computer Science, Information Systems

RAN energy efficiency and failure rate through ANN traffic predictions

Greta Vallero, Daniela Renga, Michela Meo, Marco Ajmone Marsan

Summary: This paper focuses on using ML tools for resource management in a portion of a Radio Access Network (RAN), specifically in Base Station (BS) activation and deactivation. The aim is to reduce energy consumption while meeting the variable traffic demand of users. Traffic predictions, made using Artificial Neural Networks (ANN), are used to make informed decisions on BS activation and deactivation. The results indicate that even with prediction errors, good performance trade-offs can be achieved, and dynamic resource allocation has an impact on BS failure rates.

COMPUTER COMMUNICATIONS (2022)

Article Computer Science, Information Systems

Attacking DoH and ECH: Does Server Name Encryption Protect Users' Privacy?

Martino Trevisan, Francesca Soro, Marco Mellia, Idilio Drago, Ricardo Morla

Summary: Privacy protection is a priority on the Internet, and various methods have been used to limit personal information leakage. However, domain names are still visible to observers in the network. Efforts have been made to encrypt domain names, but this article shows that simple features and machine learning models can still recover encrypted domain names with high precision and recall. The effectiveness of padding-based mitigation is also evaluated, and it is found that all three attacks can still be successful despite padding. Therefore, more robust techniques are needed to protect end users' privacy.

ACM TRANSACTIONS ON INTERNET TECHNOLOGY (2023)

Article Computer Science, Hardware & Architecture

Practical anonymization for data streams: z-anonymity and relation with k-anonymity

Nikhil Jha, Luca Vassio, Martino Trevisan, Emilio Leonardi, Marco Mellia

Summary: With the rise of big data and data markets, preserving individuals' privacy has become crucial. Anonymization, particularly through k-anonymity, is the traditional approach to address this need. However, achieving k-anonymity becomes difficult in continuous data streams and when dealing with a large number of attributes.

PERFORMANCE EVALUATION (2023)

Article Computer Science, Information Systems

i-DarkVec: Incremental Embeddings for Darknet Traffic Analysis

Luca Gioacchini, Luca Vassio, Marco Mellia, Idilio Drago, Zied Ben Houidi, Dario Rossi

Summary: Darknets are probes that listen to traffic reaching IP addresses that host no services. This traffic results from the actions of internet scanners, botnets, and misconfigured hosts. i-DarkVec is a methodology that uses Natural Language Processing techniques to learn meaningful representations of darknet traffic. The embeddings learned with i-DarkVec enable various machine learning tasks, such as identifying clusters of senders engaged in similar activities and solving the classification problem of associating unknown sources with coordinated actors. i-DarkVec leverages a scalable and robust incremental embedding learning approach, making it applicable to dynamic and large-scale scenarios.

ACM TRANSACTIONS ON INTERNET TECHNOLOGY (2023)

Article Engineering, Electrical & Electronic

From Design to Deployment of Zero Touch Deep Reinforcement Learning WLANs

Ovidiu Iacoboaiea, Jonatan Krolikowski, Zied Ben Houidi, Dario Rossi

Summary: Machine learning is being increasingly used in automating networking tasks, known as zero touch network and service management (ZSM). Deep reinforcement learning (DRL) techniques have gained attention for their ability to make complex decisions across various fields. In the ZSM context, DRL is an attractive approach for tasks like dynamic resource allocation, typically formulated as hard optimization problems. However, training and deploying DRL agents in real-world scenarios face challenges, which are addressed in this article through guidelines focusing on wireless local area network radio resource management.

IEEE COMMUNICATIONS MAGAZINE (2023)

Article Computer Science, Information Systems

Data driven scalability and profitability analysis in free floating electric car sharing systems

Alessandro Ciociola, Danilo Giordano, Luca Vassio, Marco Mellia

Summary: This paper analyzes the impact of different demand intensities on system design options for electric vehicle free-floating car sharing systems (EV-FFCS). Data from a car sharing system in three different cities are used to build demand and supply models. The performance of different design options is evaluated from the perspectives of customers and operators in terms of service quality and profitability. The study examines the number and placement of chargers, as well as fleet size. The results highlight the importance of scaling charging infrastructure capacity proportionally to mobility demand and the potential for profitability with increased demand and fleet size.

INFORMATION SCIENCES (2023)

Article Computer Science, Hardware & Architecture

Machine learning empowered computer networks

Tania Cerquitelli, Michela Meo, Marilia Curado, Lea Skorin-Kapov, Eirini Eleni Tsiropoulou

Summary: This special issue explores how emerging machine learning (ML) and artificial intelligence (AI) algorithms can help computer networks become smarter, aiming to disseminate cutting-edge research findings and advances in computer networks with innovative data-driven methodologies and technologies empowered by ML. The objective is to present effective and promising ML methodologies in the networking context to inspire other researchers and practitioners in the field.

COMPUTER NETWORKS (2023)

Proceedings Paper Computer Science, Information Systems

Lost in Translation: AI-based Generator of Cross-Language Sound-squatting

Rodolfo Valentim, Idilio Drago, Marco Mellia, Federico Cerutti

Summary: Sound-squatting is a phishing attack that exploits similarities in the pronunciation of words to deceive users into accessing malicious resources. Defending against this threat is complex and existing solutions are limited in scope. To address this, we introduce Sound-squatter, a multi-language AI-based system that generates sound-squatting candidates for proactive defense, covering a large percentage of exact and approximated homophones.

2023 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS, EUROS&PW (2023)

Proceedings Paper Computer Science, Hardware & Architecture

ReCoCo: Reinforcement learning-based Congestion control for Real-time applications

Dena Markudova, Michela Meo

Summary: This study proposes ReCoCo, a congestion control solution for RTC applications based on reinforcement learning. By collecting network condition information at the receiver-side and predicting the available bandwidth, it outperforms the GCC algorithm in both specialized and general models.

2023 IEEE 24TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE SWITCHING AND ROUTING, HPSR (2023)

Proceedings Paper Engineering, Electrical & Electronic

A collaborative caching over PLC for remote areas

Zunera Umar, Michela Meo

Summary: Power line communication (PLC) technology allows for broadband access networks in remote areas using existing power infrastructure, with the help of edge servers and devices that improve data processing and reduce network delays, as well as caching technology for efficient data retrieval and storage.

2022 32ND INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC) (2022)

Proceedings Paper Computer Science, Interdisciplinary Applications

Modeling Service Mixes in Access Links: Product Form and Oscillations

Andrea Marin, Michela Meo, Matteo Sereno, Marco Ajmone Marsan

Summary: In this study, we analyze the performance of an access link in a data network loaded with data flows from streaming and elastic services. We introduce a new queuing model and demonstrate that, with the admission control algorithm, the model can express the joint limiting probability distribution of active services of different types as a product form expression. Numerical results reveal unexpected oscillating behaviors in several performance metrics and provide interesting insights into the link performance.

2022 IEEE 23RD INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS (WOWMOM 2022) (2022)

Proceedings Paper Computer Science, Artificial Intelligence

Towards NLP-based Processing of Honeypot Logs

Matteo Boffa, Giulia Milan, Luca Vassio, Idilio Drago, Marco Mellia, Zied Ben Houidi

Summary: This study evaluates the application of Natural Language Processing (NLP) in honeypot attack activities and successfully uses clustering algorithms to identify attackers' goals. This is of great importance for automatically identifying attack patterns in honeypots and supporting security activities.

7TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW 2022) (2022)

Proceedings Paper Computer Science, Artificial Intelligence

What Scanners do at L7? Exploring Horizontal Honeypots for Security Monitoring

Thomas Favale, Danilo Giordano, Idilio Drago, Marco Mellia

Summary: This paper revisits the visibility problem of honeypots from a horizontal perspective and deploys a flexible honeypot system to collect and analyze data from multiple services. The study reveals that some attackers focus on a few services while others target multiple services simultaneously. Furthermore, it provides an analysis of brute-force attacks against multiple services.

7TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW 2022) (2022)

Proceedings Paper Computer Science, Artificial Intelligence

AI-based Sound-Squatting Attack Made Possible

Rodolfo Valentim, Idilio Drago, Federico Cerutti, Marco Mellia

Summary: Domain squatting is an attacking technique that tricks users by exploiting the similarity between domain names, and sound-squatting is a specific type that targets the similarity in pronunciation. With the increasing popularity of intelligent speakers and voice-based navigation, there is a need for better methods to protect users from sound-squatting attacks. In this study, an AI-based approach is proposed to automatically generate sound-squatting candidates using text translation capabilities. The generated candidates are evaluated and classified according to their threat level, demonstrating the usefulness of automatic sound-squatting generation in proactively preventing abuse.

7TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW 2022) (2022)

Proceedings Paper Computer Science, Information Systems

Caching in the Air: High Altitude Platform Stations for Urban Environments

Greta Vallero, Daniela Renga, Michela Meo

Summary: With advancements in communications technologies and antennas, High Altitude Platforms (HAPS) are now considered a promising aerial network component that can support Radio Access Networks (RANs). Equipped with directional antennas, HAPS can activate beams and provide coverage to a large radius of ground area. By off-loading content requests using a Multi Access Edge Computing (MEC) server, HAPS can bring additional capacity to RANs.

2022 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC) (2022)

No Data Available