Application-aware realtime monitoring with data visualization in OpenFlow-based network

Yun Zhan Cai, Chia Ying Lin, Meng Hsun Tsai

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

For network managers, it is important to find the burst network traffic as soon as possible. However, most network monitoring system can not find the source of the problematic flow in a short time. In this paper, we design an efficient realtime deep packet inspection (DPI) monitoring system, which can help us observe not only the topology but also the protocol such as Facebook or Google. To make the system efficient, we do some experiments about changes of different cache method in nDPI and effects of different parameters in D3.js force layout library.

Original languageEnglish
Title of host publicationProceedings - 31st IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2017
EditorsTomoya Enokido, Makoto Takizawa, Chi-Yi Lin, Hui-Huang Hsu, Leonard Barolli
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages385-390
Number of pages6
ISBN (Electronic)9781509062300
DOIs
Publication statusPublished - 2017 May 16
Event31st IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2017 - Taipei, Taiwan
Duration: 2017 Mar 272017 Mar 29

Publication series

NameProceedings - 31st IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2017

Other

Other31st IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2017
CountryTaiwan
CityTaipei
Period17-03-2717-03-29

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Hardware and Architecture
  • Information Systems
  • Safety, Risk, Reliability and Quality
  • Information Systems and Management

Fingerprint Dive into the research topics of 'Application-aware realtime monitoring with data visualization in OpenFlow-based network'. Together they form a unique fingerprint.

Cite this