Identifying High Cardinality Internet Hosts

被引:46
|
作者
Cao, Jin [1 ]
Jin, Yu [2 ]
Chen, Aiyou [1 ]
Bu, Tian [1 ]
Zhang, Zhi-Li [2 ]
机构
[1] Alcatel Lucent, Bell Labs, Murray Hill, NJ USA
[2] Univ Minnesota, Dept Comp Sci, Minneapolis, MN 55455 USA
基金
美国国家科学基金会;
关键词
D O I
10.1109/INFCOM.2009.5061990
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet host cardinality, defined as the number of distinct peers that an Internet host communicates with, is an important metric for profiling Internet hosts. Some example applications include behavior based network intrusion detection, p2p hosts identification, and server identification. However, due to the tremendous number of hosts in the Internet and high speed links, tracking the exact cardinality of each host is not feasible due to the limited memory and computation resource. Existing approaches on host cardinality counting have primarily focused on hosts of extremely high cardinatities. These methods do not work well with hosts of moderately large cardinalities that are needed for certain host behavior profiling such as detection of p2p hosts or port scanners. In this paper, we propose an online sampling approach for identifying hosts whose cardinality exceeds some moderate prescribed threshold, e.g. 50, or within specific ranges. The main advantage of our approach is that it can filter out the majority of low cardinality hosts while preserving the hosts of interest, and hence minimize the memory resources wasted by tracking irrelevant hosts. Our approach consists of three components: 1) two-phase filtering for eliminating low cardinality hosts, 2) thresholded bitmap for counting cardinatities, and 3) bias correction. Through both theoretical analysis and experiments using real Internet traces, we demonstrate that our approach requires much less memory than existing approaches do whereas yields more accurate estimates.
引用
收藏
页码:810 / +
页数:2
相关论文
共 50 条
  • [21] Geolocation of Internet hosts using smartphones and crowdsourcing
    Ciavarrini, Gloria
    Disperati, Francesco
    Lenzini, Luciano
    Luconi, Valerio
    Vecchio, Alessio
    2015 8TH IFIP WIRELESS AND MOBILE NETWORKING CONFERENCE (WMNC), 2015, : 176 - 183
  • [22] Identifying patterns in Internet traffic
    Saifulla, MA
    Murthy, HA
    Gonsalves, TA
    PROCEEDINGS OF THE ICCC 2002: 15TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION, VOLS 1 AND 2: REDEFINING INTERNET IN THE CONTEXT OF PERVASIVE COMPUTING, 2002, : 859 - 865
  • [23] On Identifying the Bounds of an Internet Resource
    Poursardar, Faryaneh
    Shipman, Frank
    PROCEEDINGS OF THE 2016 ACM CONFERENCE ON HUMAN INFORMATION INTERACTION AND RETRIEVAL (CHIIR'16), 2016, : 305 - 308
  • [24] Identifying Important Internet Outages
    Bogutz, Ryan
    Pradkin, Yuri
    Heidemann, John
    2019 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2019, : 3002 - 3007
  • [25] Identifying Potential Hosts of Short-Branch Microsporidia
    Annemie Doliwa
    Micah Dunthorn
    Erika Rassoshanska
    Frédéric Mahé
    David Bass
    Camila Duarte Ritter
    Microbial Ecology, 2021, 82 : 549 - 553
  • [26] Identifying Hosts of Families of Viruses: A Machine Learning Approach
    Raj, Anil
    Dewar, Michael
    Palacios, Gustavo
    Rabadan, Raul
    Wiggins, Christopher H.
    PLOS ONE, 2011, 6 (12):
  • [27] Identifying Potential Hosts of Short-Branch Microsporidia
    Doliwa, Annemie
    Dunthorn, Micah
    Rassoshanska, Erika
    Mahe, Frederic
    Bass, David
    Duarte Ritter, Camila
    MICROBIAL ECOLOGY, 2021, 82 (02) : 549 - 553
  • [28] Internet traffic classification based on hosts behavior analysis
    Ye, Chun-Ming
    Wang, Zhen
    Chen, Si
    Shan, Hong
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2014, 36 (09): : 2158 - 2165
  • [29] Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing
    Moore, Tyler
    Clayton, Richard
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2009, 5628 : 256 - +
  • [30] Whois Based Geolocation: a strategy to geolocate Internet Hosts
    Endo, Patricia Takako
    Hadj Sadok, Djamel Fawzi
    2010 24TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2010, : 408 - 413