2010 National Conference on Communications (NCC) 2010
DOI: 10.1109/ncc.2010.5430163
|View full text |Cite
|
Sign up to set email alerts
|

Internet activity analysis through proxy log

Abstract: The availability of the Internet at the click of a mouse brings with it a host of new problems. Although the World Wide Web was first started by physicists at CERN to enable collation and exchange of data, today, it is used for a wide range of applications. The requirements on bandwidth for each of the applications is also varied. An Internet Service Provider must ensure satisfaction across the entire spectrum of users. To ensure this, analysis of Internet usage becomes essential. Further, an administrator can… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2012
2012
2018
2018

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 7 publications
0
4
0
Order By: Relevance
“…(ii) Abusive usage: Abusive usage is another common problem with campus networks. Bommepally et al (2010) has found that a large fraction of the Internet access bandwidth is consumed by a small number of users. Prior work in this area (Chu & Chang 2007;Kumar et al 2000;Lin et al 2004;Paine & Griggs 2008) simply counts the bytes for each user to detect abusive usage.…”
Section: Multi-level Anomaly Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…(ii) Abusive usage: Abusive usage is another common problem with campus networks. Bommepally et al (2010) has found that a large fraction of the Internet access bandwidth is consumed by a small number of users. Prior work in this area (Chu & Chang 2007;Kumar et al 2000;Lin et al 2004;Paine & Griggs 2008) simply counts the bytes for each user to detect abusive usage.…”
Section: Multi-level Anomaly Detectionmentioning
confidence: 99%
“…LANs in university campuses and commercial institutions that access the Internet are faced with the problem of bad Internet experience during peak hours. Bommepally et al (2010) has found that a large fraction of the Internet access bandwidth is consumed by a small number of users. These users need to be controlled so that Internet access can be fair to everyone.…”
Section: Abusive Usage Controlmentioning
confidence: 99%
“…They assumed that a user visits multiple related websites, thus enabling cluster formation. [6] analyzed the proxy logs to discover the amount of time spent by user on the Internet, and proposed certain control mechanisms based on the traffic pattern generated.…”
Section: Introductionmentioning
confidence: 99%
“…A major contributing factor to the consumption of bandwidth (and consequent dissatisfaction on the part of many users) is the excessive use of bandwidth-hungry applications like P2P file sharing and videos [1] [2] by those addicted to Internet surfing. These constitute a minority of the users yet they consume most of the bandwidth [3] [4]. They need to be controlled by suitable bandwidth control policies during peak hours for a better overall user experience.…”
Section: Introductionmentioning
confidence: 99%