Understanding Effectiveness of Eco Monitoring Networks: Information Theoretical Perspective

Article Preview

Abstract:

This work studies eco monitoring networks. As eco monitoring networks have been used to monitor large networks, questions arise whether decentralized inference is efficient and whether an eco monitoring network with a moderate size can monitor an underlying network at the Internet scale. This work studies the local effectiveness of decentralized inference done by individual monitors. Information theoretical measures, i.e., conditional non-uniformity factor is applied to quantify the effectiveness. Large-scale data from DShield is used to access the effectiveness of a real eco monitoring network.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 765-767)

Pages:

2213-2219

Citation:

Online since:

September 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Internet Storm Center (DShield), http: /www. dshield. org.

Google Scholar

[2] http: /www. predict. org.

Google Scholar

[3] Y. Shavitt and E. Shir, DIMES: Let the Internet Measures Itself, ACM(Sigcomm) Computer Communication Review, Vol. 35, Issue 5, pp.71-74, Oct. (2005).

DOI: 10.1145/1096536.1096546

Google Scholar

[4] M. Allman, P. Barford, B. Krishnamuthy, J. Wang, Tracking the Role of Adversaries in Measuring Unwanted Traffic, Proc. Of The Unix Second Workshop on Steps to Reducing Unwanted Traffic on the Internet, July (2006).

Google Scholar

[5] Z. Chen, C. Ji, and P. Barford, Spatial-temporal characteristics of malicious sources, " Proc. of INFOCOM, 08 Mini-Conference, Phoenix, AZ, April (2008).

DOI: 10.1109/infocom.2008.299

Google Scholar

[6] F. Soldo, A. Le, and A. Markopoulou, Predicative Blacklisting as an Implicit Recommendation System, Proc. Infocom (2010).

DOI: 10.1109/infcom.2010.5461982

Google Scholar

[7] L. Huang, X. Nguyen, M. Garofalakis, J. Hellerstein, M. Jordon, A. Joseph, N. Taft, Communication-Efficient Online Detection of Network-Wide Anomalies, Proc. Infocom (2007).

DOI: 10.1109/infcom.2007.24

Google Scholar

[8] S. Kandula, R. Mahajan, P. Verkaik, S. Agawal, J. Padhye, P. Bahl, Detailed Diagnosis in Enterprise Networks, Proc. Sigcomm (2009).

DOI: 10.1145/1592568.1592597

Google Scholar

[9] M. Thottan, G. Liu and C. Ji, Anomaly Detection Approaches for Communication Networks, in Algorithms for Next Generation Networks, edited by G. Cormode and M. Thottan, Springer London, 239-261, Feb. (2010).

DOI: 10.1007/978-1-84882-765-3_11

Google Scholar

[10] Z. Chen and C. Ji, Information Theoretical View of Network-Aware Attacks, IEEE Trans. Information Security and Forensics, Vol. 4, Issue 3, 530-541, Sept. (2009).

DOI: 10.1109/tifs.2009.2025847

Google Scholar

[11] J. N. Tsitsiklis, Decentralized Detection, in Advances in Signal Processing, Vol. 2, H. V. Poor and J. B. Thomas, editors, JAI Press, 1993, pp.297-344.

Google Scholar

[12] V. V. Veeravalli, T. Basar and H. V. Poor. Decentralized Sequential Detection with Sensors Performing Sequential Tests., Journal on Mathematics of Control Signals and Systems, 7(4): 292-305, December (1994).

DOI: 10.1007/bf01211521

Google Scholar

[13] R. Duda, P. Hart and D. Stork, Pattern Classification, 2nd edition, John Willy and Sons, (2001).

Google Scholar