Skip to Content

Search: {{$root.lsaSearchQuery.q}}, Page {{$}}

Joel Vaughan

Tuesday, April 17, 2012
12:00 AM
411 West Hall

Computer Network Modeling, Kriging, and Prediction of Computer Network Traffic

Title: Computer Network Modeling, Kriging, and Prediction of Computer Network Traffic
Co-Chairs: Professor George Michailidis, Associate Professor Stillian Stoev
Cognate Member: Assistant Professor Veronica Berrocal
Members: Professor Vijay Nair, Professor Kerby Shedden

Abstract: In order to maintain consistent quality of service, engineers face the task of monitoring the traffic fluctuations on the individual links making up a computer network. However, due to resource constraints and limited access, it is often not possible to directly measure the traffic on all links. This work explores a statistical framework for simultaneously modeling the traffic levels on links across an entire network and using the model to solve a variety of statistical problems, including prediction of traffic on unobserved links and the detection of statistical anomalies. We begin by examining some of the important types of network traffic data and features of the traffic. These features present interesting challenges but also provide important structure that is used throughout this work. We next develop a probabilistic spatio--temporal model for large scale computer networks that is based on physical properties of computer networks. This model simultaneously describes the traffic level on all the links of the network, and how these levels fluctuate over time. We next move on to study the so--called kriging and prediction problems, where we use observed traffic measurements on a small subsets of the links of a network to predict the traffic on other (unobserved) links in the network. We then explore an application of this prediction technique to anomaly detection. Finally, we develop an alternative model that more explicitly incorporates the dependence in traffic that arises due to certain mechanisms in the protocols that govern network behavior. We conclude by discussing the strengths and weaknesses of these two approaches.

Joel Vaughan