Paper Submission: 27 May 2020
Author Notification: 10 days
Journal Publication: May 2020
Asfiya Sultana , Dr. Bhat Geetalaxmi Jairam
Monitoring the network forms an important part of the Network Management, assisting in visualization of the network behaviour in real time. Networks are growing extensively and managing this huge network is utterly challenging. Traffic engineering, quality of service, and anomaly detection also depend on network monitoring for decision making (1). In spite of the ever-increasing complicated networks there are a number of approaches proposed for network monitoring which help to reduce the extra overhead on the network, along with monitoring the entire network as efficiently as possible. This paper lists and studies a few of these Network Monitoring Approaches and also various applications of Network Monitoring.
 P.-W. Tsai, C.-W.Tsai, C.-W.Hsu, and C.-S. Yang, “Network Monitoring in Software-Defined Networking: A Review,” IEEE Systems Journal, vol. 12, no. 4, pp. 3958–3969, Dec. 2018.
 Mathieu Dahan, LinaSela, Saurabh Amin, “Network Inspection for Detecting Strategic Attacks”. Published on Oct 14, 2018in arXiv: Computer Science and Game Theory
 Xin Li, Fang Bian, Hui Zhang, C. Diot, R. Govindan, Wei Hong Hong, and G. Lannaccone, “Advanced Indexing Techniques for Wide-Area Network Monitoring,” 21st International Conference on Data Engineering Workshops (ICDEW’05), 2005.
 F. Fischer, F. Mansmann, D. A. Keim, S. Pietzko, and M. Waldvogel, “Large-Scale Network Monitoring for Visual Analysis of Attacks,” Lecture Notes in Computer Science, pp. 111–118.
 P. Barford and D. Plonka, “Characteristics of network traffic flow anomalies,” Proceedings of the First ACM SIGCOMM Workshop on Internet Measurement - IMW ’01, 2001.
 M. Mdini, A. Blanc, G. Simon, J. Barotin, and J. Lecoeuvre, “Monitoring the network monitoring system: Anomaly Detection using pattern recognition,” 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), May 2017.
Y. Lai, Y. Chen, Z. Liu, Z. Yang, and X. Li, “On monitoring and predicting mobile network traffic abnormality,” Simulation Modelling Practice and Theory, vol. 50, pp. 176–188, Jan. 2015.
 R. Talpade, G. Kim, and S. Khurana, “NOMAD: traffic-based network monitoring framework for anomaly detection,” Proceedings IEEE International Symposium on Computers and Communications (Cat. No.PR00250).
 B. Kurt, E. Zeydan, U. Yabas, I. A. Karatepe, G. K. Kurt, and A. T. Cemgil, “A Network Monitoring System for High Speed Network Traffic,” 2016 13th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), Jun. 2016.
 J. Kim and A. Sim, “A New Approach to Online, Multivariate Network Traffic Analysis,” 2017 26th International Conference on Computer Communication and Networks (ICCCN), Jul. 2017.
 Fragouli, Christina &Markopoulou, A. (2005) “A network coding approach to overlay network monitoring”.
 Y. Chen, D. Bindel, and R. H. Katz, “Tomographybased overlay network monitoring,” Proceedings of the 2003 ACM SIGCOMM conference on Internet measurement - IMC ’03, 2003.
 Y. Chen, D. Bindel, H. Song, and R. H. Katz, “An algebraic approach to practical and scalable overlay network monitoring,” ACM SIGCOMM Computer Communication Review, vol. 34, no. 4, p. 55, Oct. 2004.
 S.-H. Shen, “An Efficient Network Monitor for SDN Networks,” ACM SIGMETRICS Performance Evaluation Review, vol. 46, no. 2, pp. 95–96, Jan. 2019.
 S. R. Chowdhury, M. F. Bari, R. Ahmed and R. Boutaba, "PayLess: A low cost network monitoring framework for Software Defined Networks," 2014 IEEE Network Operations and Management Symposium (NOMS), Krakow, 2014, pp. 1-9.\
 D. F. Macedo, D. Guedes, L. F. M. Vieira, M. A. M. Vieira, and M. Nogueira, “Programmable Networks—From Software-Defined Radio to Software-Defined Networking,” IEEE Communications Surveys & Tutorials, vol. 17, no. 2, pp. 1102–1125, 2015
 N. L. M. van Adrichem, C. Doerr, and F. A. Kuipers, “OpenNetMon: Network monitoring in OpenFlow Software-Defined Networks,” 2014 IEEE Network Operations and Management Symposium (NOMS), May 2014.
 A. Ciuffoletti, “Monitoring a virtual network infrastructure,” ACM SIGCOMM Computer Communication Review, vol. 40, no. 5, p. 47, Oct. 2010.
T. Ho, B. Leong, Yu-Han Chang, Yonggang Wen, and R. Koetter, “Network monitoring in multicast networks using network coding,” Proceedings. International Symposium on Information Theory, 2005.ISIT 2005.
 J. Maerien, P. Agten, C. Huygens, and W. Joosen, “FAMoS: A Flexible Active Monitoring Service for Wireless Sensor Networks,” Lecture Notes in Computer Science, pp. 104–117, 2012.
 Woodall, William & Zhao, Meng&Paynabar, Kamran & Wilson, James. (2016). An Overview and Perspective on Social Network Monitoring. IISE Transactions.49. 10.1080/0740817X.2016.1213468.
 A. Faggiani, E. Gregori, L. Lenzini, V. Luconi, and A. Vecchio, “Smartphone-based crowdsourcing for network monitoring: Opportunities, challenges, and acase study,” IEEE Communications Magazine, vol. 52, no. 1, pp. 106–113, Jan. 2014
 Bhargavan, Karthikeyan& Chandra, Satish& J. Mccann, Peter & A. Gunter, Carl. (2001). “What Packets May Come: Automata for Network Monitoring”. SIGPLAN Notices (ACM Special Interest Group on Programming Languages). 36. 10.1145/373243.360221.
 F. Reiss and J. M. Hellerstein, “Declarative Network Monitoring with an Underprovisioned Query Processor,” 22nd International Conference on Data Engineering (ICDE’06), 2006
 M. Coates, Y. Pointurier, and M. Rabbat, “Compressed network monitoring for ip and alloptical networks,” Proceedings of the 7th ACM SIGCOMM conference on Internet measurement - IMC ’07, 2007.
 D. B. Chua, E. D. Kolaczyk, and M. Crovella, “Efficient monitoring of end-to-end network properties,” Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.
A. Fattaholmanan, H. R. Rabiee, P. Siyari, A. Soltani-Farani, and A. Khodadadi, “Peer-to-Peer Compressive Sensing for Network Monitoring,” IEEE Communications Letters, vol. 19, no. 1, pp. 38–41, Jan. 2015
 Fisk, Mike, Steven A. Smith, Paul M. Weber, Satyam Kothapally and Thomas P. Caudell. “Immersive Network Monitoring.” (2003).
 Iliofotou, Marios&Pappu, Prashanth&Faloutsos, Michalis&Mitzenmacher, Michael & Singh, Sumeet& Varghese, George. (2007). Network monitoring using traffic dispersion graphs (TDGs). 315-320. 10.1145/1298306.1298349.
 M. Iliofotou, “Exploring Graph-Based Network Traffic Monitoring,” IEEE INFOCOM Workshops 2009, Apr. 2009.
 Z. Hu and J. Luo, “Cracking network monitoring in DCNs with SDN,” 2015 IEEE Conference on Computer Communications (INFOCOM), Apr. 2015.
 A. Liotta, G. Pavlou and G. Knight, "Exploiting agent mobility for large-scale network monitoring," in IEEE Network, vol. 16, no. 3, pp. 7-15, May-June 2002. doi: 10.1109/MNET.2002.1002994
 C. C. Ho, K. N. Ramachandran, K. C. Almeroth, and E. M. Belding-Royer, “A scalable framework for wireless network monitoring,” Proceedings of the 2nd ACM international workshop on Wireless mobile applications and services on WLAN hotspots - WMASH ’04, 2004.
A. I. Frunza, C. I. Rincu, and A. Jitaru, “Remote Network Monitoring Using SDN Based Solutions,” 2018 International Conference on Communications (COMM), Jun. 2018
 E. T. de Camargo and E. P. Duarte, “Network Monitoring with Imperfect Tests,” Proceedings of the 2016 workshop on Fostering Latin-American Research in Data Communication Networks - LANCOMM ’16, 2016.
 K. S. Shin, J. H. Jung, J. Y. Cheon, and S. B. Choi, “Real-time network monitoring scheme based on SNMP for dynamic information,” Journal of Network and Computer Applications, vol. 30, no. 1, pp. 331– 353, Jan. 2007.
 S. W. Kortschot, D. Sovilj, H. Soh, G. A. Jamieson, S. Sanner, C. Carrasco, S. Ralph, and S. Langevin, “An open source adaptive user interface for network monitoring,” 2017 IEEE International Conference on Systems, Man, and Cybernetics (SMC), Oct. 2017.
 A. Roohi, K. Raeisifard, and S. Ibrahim, “An application for management and monitoring the data centers based on SNMP,” 2014 IEEE Student Conference on Research and Development, Dec. 2014.
 G. Suciu, V. Suciu and C. Butca, "Network management and monitoring using M2M sensor systems," 2014 IEEE 20th International Symposium for Design and Technology in Electronic Packaging (SIITME), Bucharest, 2014, pp. 175-178.
K. A. Bradley, S. Cheung, N. Puketza, B. Mukherjee, and R. A. Olsson, “Detecting disruptive routers: a distributed network monitoring approach,” Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat.No.98CB36186).
 S. Silvestri, R. Urgaonkar, M. Zafer, and B. J. Ko, “An Online Method for Minimizing Network Monitoring Overhead,” 2015 IEEE 35th International Conference on Distributed Computing Systems, Jun. 2015.
 N. Dandapanthula, H. Subramoni, J. Vienne, K. Kandalla, S. Sur, D. K. Panda, and R. Brightwell, “INAM - A Scalable InfiniBand Network Analysis and Monitoring Tool,” Lecture Notes in Computer Science, pp. 166–177, 2012.
Information Science & Engineering, The National Institute of Engineering, Mysuru, Karnataka, India,9945301126(e-mail: email@example.com)
DOI: 10.21276/ijircst.2019.7.4.3 DOI URL: https://doi.org/10.21276/ijircst.2019.7.4.3
No. of Downloads: 11 | No. of Views: 659