Skip to main content

Mining Approximate Frequent Closed Flows over Packet Streams

  • Conference paper
Data Warehousing and Knowledge Discovery (DaWaK 2011)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 6862))

Included in the following conference series:

  • 1248 Accesses

Abstract

Due to the varying and dynamic characteristics of network traffic, the analysis of traffic flows is of paramount importance for network security, accounting and traffic engineering. The problem of extracting knowledge from the traffic flows is known as the heavy-hitter issue. In this context, the main challenge consists in mining the traffic flows with high accuracy and limited memory consumption. In the aim of improving the accuracy of heavy-hitters identification while having a reasonable memory usage, we introduce a novel algorithm called ACL-Stream. The latter mines the approximate closed frequent patterns over a stream of packets. Carried out experiments showed that our proposed algorithm presents better performances compared to those of the pioneer known algorithms for heavy-hitters extraction over real network traffic traces.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Aggrawal, C.C.: Data Streams: Models and Algorithms. Springer, Heidelberg (2007)

    Book  Google Scholar 

  2. Barakat, C., Iannaccone, G., Diot, C.: Ranking Flows From Sampled Traffic. In: Proceedings of the 2005 ACM Conference on Emerging Network Experiment and Technology, Toulouse, France, pp. 188–199 (2005)

    Google Scholar 

  3. Bhattacharyya, S., Madeira, A., Muthukrishnan, S., Ye, T.: How To Scalably and Accurately Skip Past Streams. In: Proceedings of the IEEE 23rd International Conference on Data Engineeringg, Istanbul, Turkey, pp. 654–663 (2007)

    Google Scholar 

  4. Bu, T., Cao, J., Chen, A., Lee, P.P.C.: Sequential Hashing: A Flexible Approach for Unveiling Significant Patterns in High Speed Networks. Computer Network 54(18), 3309–3326 (2010)

    Article  MATH  Google Scholar 

  5. Cormode, G., Muthukrishnan, S.: An Improved Data Stream Summary: The Count-Min Sketch and its Applications. Journal of Algorithms 55(1), 58–75 (2005)

    Article  MATH  Google Scholar 

  6. Demaine, E.D., López-Ortiz, A., Munro, J.I.: Frequency Estimation of Internet Packet Streams with Limited Space. In: Proceedings of the 10th Annual European Symposium on Algorithms, Rome, Italy, pp. 348–360 (2002)

    Google Scholar 

  7. Dimitropoulos, X., Hurley, P., Kind, A.: Probabilistic Lossy Counting: An Efficient Algorithm for Finding Heavy-hitters. ACM SIGCOMM Computer Communications Review 38(1), 5–5 (2008)

    Article  Google Scholar 

  8. Duffeld, N., Lund, C., Thorup, M.: Flow Sampling Under Hard Resource Constraints. In: Proceedings of the Joint International Conference on Measurement and Modeling of Computer Systems, pp. 85–96. ACM Press, New York (2004)

    Google Scholar 

  9. Kamiyama, N., Mori, T.: Simple and Accurate Identification of High-rate Flows by Packet Sampling. In: Proceedings of the 25th IEEE International Conference on Computer Communications, Barcelona, Spain, pp. 2836–2848 (2006)

    Google Scholar 

  10. Kodialam, M., Lakshman, T.V., Monhanty, S.: Runs Based Traffic Estimator (RATE): A Simple, Memory Efficient Scheme for Per-Flow Rate Estimation. In: Proceedings of the 23rd Annual Joint Conference of the IEEE Computer and Communications Societies, Hong Kong, China, pp. 1808–1818 (2004)

    Google Scholar 

  11. Li, X., Deng, Z.H.: Mining Frequent Patterns from Network Flows for Monitoring Network. Expert System with Applications 37(12), 8850–8860 (2010)

    Article  Google Scholar 

  12. Manku, G.S., Motwani, R.: Approximate Frequency Counts over Data Streams. In: Proceedings of the 28th International Conference on Very Large Data Bases, Hong Kong, China, pp. 346–357 (2002)

    Google Scholar 

  13. Pasquier, N., Bastide, Y., Taouil, R., Lakhal, L.: Discovering frequent closed itemsets for association rules. In: Beeri, C., Bruneman, P. (eds.) ICDT 1999. LNCS, vol. 1540, pp. 398–416. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  14. Rong, Q., Zhang, G., Xie, G., Salamatian, K.: Mnemonic Lossy Counting: An Efficient and Accurate Heavy-hitters Identification Algorithm. In: Proceedings of the 29th IEEE International Performance Computing and Communications Conference, Albuquerque, United States (2010)

    Google Scholar 

  15. Zhang, Y., Fang, B.X., Zhang, Y.Z.: Identifying Heavy-hitters in High-speed Network Monitoring. Science 53(3), 659–676 (2010)

    Google Scholar 

  16. Zhang, Z., Wang, B., Chen, S., Zhu, K.: Mining Frequent Flows Based on Adaptive Threshold with a Sliding Window over Online Packet Stream. In: Proceedings of the International Conference on Communication Software and Networks, Macau, China, pp. 210–214 (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Brahmi, I., Ben Yahia, S., Poncelet, P. (2011). Mining Approximate Frequent Closed Flows over Packet Streams. In: Cuzzocrea, A., Dayal, U. (eds) Data Warehousing and Knowledge Discovery. DaWaK 2011. Lecture Notes in Computer Science, vol 6862. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23544-3_32

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-23544-3_32

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-23543-6

  • Online ISBN: 978-3-642-23544-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics