Paper
1 October 2011 Study of algorithms for selecting effective network traffic monitors based on cover ratio
Guangming Chen, Yingjie Yang
Author Affiliations +
Proceedings Volume 8285, International Conference on Graphic and Image Processing (ICGIP 2011); 828562 (2011) https://doi.org/10.1117/12.913455
Event: 2011 International Conference on Graphic and Image Processing, 2011, Cairo, Egypt
Abstract
Network traffic monitoring is a key component in the network management. Optimally selecting a small number of effective monitors can minimize the monitoring cost and maxi- mize the traffic cover ratio. However, if it is only needed to cover a portion of traffic with a given cover ratio, there can be multiple solutions satisfying the optimization requirements according to the former optimal selection methods. From the perspective of protection, for the purpose of getting the relatively best solutions, in consideration of the nodes whose failure will result in the maximal disconnection of the network, this paper investigates the idea of selecting a few critical nodes as monitors to achieve effective monitoring of the network traffic. We present practical solutions for two situations-"cost constraints" and "ensuring the cover ratio". We develop heuristics to cope with such problems. Our simulation results show that the critical nodes selected optimally are not only destructive, but can also be effective monitors for network traffic.
© (2011) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Guangming Chen and Yingjie Yang "Study of algorithms for selecting effective network traffic monitors based on cover ratio", Proc. SPIE 8285, International Conference on Graphic and Image Processing (ICGIP 2011), 828562 (1 October 2011); https://doi.org/10.1117/12.913455
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Virtual colonoscopy

Internet

Network security

Image classification

Image processing

Information science

Information security

RELATED CONTENT


Back to Top