Detection and avoidance technique of anomalous congestion at the network gateways
Active queue management (AQM) techniques are used to maintain congestion at network routers. Random Early Detection (RED) is the most used technique among the existing AQMs, as it can avoid network congestion at the early stage. The RED technique avoids congestion by prompting users to reduce their...
Saved in:
Main Author: | |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
IEEE
2018
|
Subjects: | |
Online Access: | http://umpir.ump.edu.my/id/eprint/23292/1/Detection%20and%20avoidance%20technique%20of%20anomalous%20congestion%20at%20the%20network%20gateways.pdf http://umpir.ump.edu.my/id/eprint/23292/ https://doi.org/10.1109/DASC-PICom-DataCom-CyberSciTec.2017.119 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Malaysia Pahang Al-Sultan Abdullah |
Language: | English |
id |
my.ump.umpir.23292 |
---|---|
record_format |
eprints |
spelling |
my.ump.umpir.232922019-05-16T06:22:42Z http://umpir.ump.edu.my/id/eprint/23292/ Detection and avoidance technique of anomalous congestion at the network gateways Ahmed, Abdulghani Ali QA76 Computer software Active queue management (AQM) techniques are used to maintain congestion at network routers. Random Early Detection (RED) is the most used technique among the existing AQMs, as it can avoid network congestion at the early stage. The RED technique avoids congestion by prompting users to reduce their windows size when the queue average exceeds a predefined threshold. However, RED technique is unable to identify users who do not respond to these notifications, and therefore, RED drops all packets in the queue. This generates false positive alarms as packets of legal users will be dropped as well. This paper proposes a technique for monitoring gateways' queues and discarding only the misbehaving traffic. In particular, the proposed technique monitors users' behavior at the network gateways to identify the real sources of misbehaving traffic that causes the congestion on the network. Congested RED-gateways report the packet transfer rate (PTR) of end-users connected with them to service level agreement unit (SLA-unit). The SLA-unit then discovers end-users who have exceeded their bandwidth shares predefined in the SLA as sources of the anomalous congestion on the network. The obtained results show that the proposed technique is promising in detecting and avoiding anomalous congestion without dropping normal traffic of legitimate end-users. IEEE 2018-03 Conference or Workshop Item PeerReviewed pdf en http://umpir.ump.edu.my/id/eprint/23292/1/Detection%20and%20avoidance%20technique%20of%20anomalous%20congestion%20at%20the%20network%20gateways.pdf Ahmed, Abdulghani Ali (2018) Detection and avoidance technique of anomalous congestion at the network gateways. In: 15th IEEE International Conference on Dependable, Autonomic and Secure Computing, 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing, 2017 IEEE 3rd International Conference on Big Data Intelligence and Computing, 6-11 November 2017 , Orlando, United States. pp. 681-686., 2018. ISBN 978-153861955-1 https://doi.org/10.1109/DASC-PICom-DataCom-CyberSciTec.2017.119 |
institution |
Universiti Malaysia Pahang Al-Sultan Abdullah |
building |
UMPSA Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Malaysia Pahang Al-Sultan Abdullah |
content_source |
UMPSA Institutional Repository |
url_provider |
http://umpir.ump.edu.my/ |
language |
English |
topic |
QA76 Computer software |
spellingShingle |
QA76 Computer software Ahmed, Abdulghani Ali Detection and avoidance technique of anomalous congestion at the network gateways |
description |
Active queue management (AQM) techniques are used to maintain congestion at network routers. Random Early Detection (RED) is the most used technique among the existing AQMs, as it can avoid network congestion at the early stage. The RED technique avoids congestion by prompting users to reduce their windows size when the queue average exceeds a predefined threshold. However, RED technique is unable to identify users who do not respond to these notifications, and therefore, RED drops all packets in the queue. This generates false positive alarms as packets of legal users will be dropped as well. This paper proposes a technique for monitoring gateways' queues and discarding only the misbehaving traffic. In particular, the proposed technique monitors users' behavior at the network gateways to identify the real sources of misbehaving traffic that causes the congestion on the network. Congested RED-gateways report the packet transfer rate (PTR) of end-users connected with them to service level agreement unit (SLA-unit). The SLA-unit then discovers end-users who have exceeded their bandwidth shares predefined in the SLA as sources of the anomalous congestion on the network. The obtained results show that the proposed technique is promising in detecting and avoiding anomalous congestion without dropping normal traffic of legitimate end-users. |
format |
Conference or Workshop Item |
author |
Ahmed, Abdulghani Ali |
author_facet |
Ahmed, Abdulghani Ali |
author_sort |
Ahmed, Abdulghani Ali |
title |
Detection and avoidance technique of anomalous congestion at the network gateways |
title_short |
Detection and avoidance technique of anomalous congestion at the network gateways |
title_full |
Detection and avoidance technique of anomalous congestion at the network gateways |
title_fullStr |
Detection and avoidance technique of anomalous congestion at the network gateways |
title_full_unstemmed |
Detection and avoidance technique of anomalous congestion at the network gateways |
title_sort |
detection and avoidance technique of anomalous congestion at the network gateways |
publisher |
IEEE |
publishDate |
2018 |
url |
http://umpir.ump.edu.my/id/eprint/23292/1/Detection%20and%20avoidance%20technique%20of%20anomalous%20congestion%20at%20the%20network%20gateways.pdf http://umpir.ump.edu.my/id/eprint/23292/ https://doi.org/10.1109/DASC-PICom-DataCom-CyberSciTec.2017.119 |
_version_ |
1822920488544894976 |