Reordenando Assinaturas em Mecanismos de Inspeção de Pacotes Baseado em Prioridade Dinâmica
Abstract
Traffic Classification and Identification plays a key role in many network management activities. In this context, DPI is one of the most used methods, being very accurate. However, a DPI system has high computational cost. Many components of a DPI architecture are constantly studied from the point of view of their impact on the computational performance of the system, in special, the signature set. In this work, the impact on the order of signatures is attested through a static ordering on the signature list. Additionally, a method to order dynamically the signature set is proposed, reducing the processing time of the DPI. The results demonstrate the impact of the order of signatures on the performance of the DPI, as well as the performance gains (through dynamics ordering) of more than 65% of the processing time. Finally, the proposed method in this work can be combined with other stateof- the-art techniques to achieve a better DPI performance.
References
Antonello, R. et al., (2012) "Deterministic Finite Automaton for scalable traffic identification: The power of compressing by range," Network Operations and Management Symposium (NOMS), IEEE April 2012.
Becchi, M. and Crowley, P., (2013) "A-DFA: A Time and Space-Efficient DFA Compression Algorithm for Fast Regular Expression Evaluation", ACM Trans. Archit. Code Optim. 10, 1, (April 2013).
Callado, A. et al., (2009) "A Survey on Internet Traffic Identification," Communications Surveys & Tutorials, IEEE. Article 15 (July 2009).
Chandola, V. et al. (2009) "Anomaly detection: A survey". ACM Comput. Surv. 41, 3,
Cho, K. et al. (2006) "The impact and implications of the growth in residential user-to-user traffic". SIGCOMM Comput. Commun. Rev. Aug 2006.
Cormem, T. H. et al. (2001). Introduction to algorithms. MIT press, Cambridge.
Fernandes, S. et al. (2009) "Slimming Down Deep Packet Inspection Systems," INFOCOM Workshops 2009, IEEE , vol., no., pp.1,6, 19-25 April 2009.
Gao, Y. et al., (2013) "A Cache Management Strategy for Transparent Computing Storage System." Trustworthy Computing and Services. Springer Berlin Heidelberg, 2013. 651-658.
Gringoli, F. et al., (2009) "GT: picking up the truth from the ground for Internet traffic", ACM SIGCOMM Comp. Comm. Review, Oct. 2009.
Hiremagalore, S. et al. (2013) "Improving network response times using social information", Social Network Analysis and Mining (2013): 1-12.
Huang, X. et al., (2012) "A Novel Replica Placement Strategy for Data Center Network", ICITMS 2012, Proc. Of., Springer Berlin.
Kawano, S. et al., (2012) "High-Speed DPI Method Using Multi-Stage Packet Flow Analyses," 9th APSITT 2012 Nov. 2012.
Kumar, S. et al., (2006) "Algorithms to accelerate multiple regular expressions matching for deep packet inspection", ACM SIGCOMM Conf. on ATAPCC.
Liu, D. et al., (2013) "Network traffic anomaly detection using clustering techniques and performance comparison", 26th IEEE CCECE, 2013.
Liu, T. et al., (2011) "An efficient regular expressions compression algorithm from a new perspective," INFOCOM, 2011 Proceedings IEEE, April 2011.
Santos, A. F. et al. (2013), "Multi-gigabit traffic identification on GPU" In Proc. of the ACM HPPN '13 Workshop. ACM, NY, USA, 39-44.
Song, T. and Zhou, Z. (2013), "File-aware P2P traffic classification: An aid to network management", PPNA Journal (2013): 1-15.
Yu, F. et al. (2006), "Fast and memory-efficient regular expression matching for deep packet inspection," Architecture for Networking and Communications systems.
Zhanikeev, M. and Tanaka, Y., (2013) "A graphical method for detection of Flash Crowds in traffic." Telecommunication Systems (2013): 1-15.
