• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Li Zhen, Yang Yahui, Xie Gaogang, Qin Guangcheng. An Identification Method Combining Data Streaming Counting with Probabilistic Fading for Heavy-Hitter Flows[J]. Journal of Computer Research and Development, 2011, 48(6): 1010-1017.
Citation: Li Zhen, Yang Yahui, Xie Gaogang, Qin Guangcheng. An Identification Method Combining Data Streaming Counting with Probabilistic Fading for Heavy-Hitter Flows[J]. Journal of Computer Research and Development, 2011, 48(6): 1010-1017.

An Identification Method Combining Data Streaming Counting with Probabilistic Fading for Heavy-Hitter Flows

More Information
  • Published Date: June 14, 2011
  • Identifying heavy-hitter flows in the network is of tremendous importance for many network management activities. Heavy-hitter flows identification is essential for network monitoring, management, and charging, etc. Network administrators usually pay special attention to these Heavy-hitter flows. How to find these flows has been the concern of many studies in the past few years. Lossy counting and probabilistic lossy counting are among the most well-known algorithms for finding Heavy-hitters. But they have some limitations. The challenge is finding a way to reduce the memory consumption effectively while achieving better accuracy. In this work, a probabilistic fading method combining data streaming counting is proposed, which is called PFC(probabilistic fading counting). This method leverages the advantages of data streaming counting, and it manages to find the heavy-hitter by analyzing the power-low characteristic in the network flow. By using networks power-law and continuity, PFC accelerates the removal of non-active and aging flows in table records. So PFC reduces memory consumption, and decreases false positive ratio too. Comparisons with lossy counting and probabilistic lossy counting based on real Internet traces suggest that PFC is remarkably efficient and more accurate. Particularly, experiment results show that PFC has 60% lower memory consumption without increasing the false positive ratio.
  • Related Articles

    [1]Qi Lei, Ren Zihao, Liu Junxi, Geng Xin. Person Re-identification Method Based on Hybrid Real-Synthetic Data[J]. Journal of Computer Research and Development, 2025, 62(2): 418-431. DOI: 10.7544/issn1000-1239.202330718
    [2]Chen Liwen, Ye Feng, Huang Tianqiang, Huang Liqing, Weng Bin, Xu Chao, Hu Jie. An Unsupervised Person Re-Identification Method Based on Intra-/Inter-Camera Merger[J]. Journal of Computer Research and Development, 2023, 60(2): 415-425. DOI: 10.7544/issn1000-1239.202110732
    [3]Hu Yu, Chen Xiaobo, Liang Jun, Chen Ling, Liang Shurong. Vehicle Re-Identification Method Based on Part Features and Multi-Attention Fusion[J]. Journal of Computer Research and Development, 2022, 59(11): 2497-2506. DOI: 10.7544/issn1000-1239.20210599
    [4]Song Yubo, Chen Bing, Zheng Tianyu, Chen Hongyuan, Chen Liquan, Hu Aiqun. Hybrid Feature Fingerprint-Based Wireless Device Identification[J]. Journal of Computer Research and Development, 2021, 58(11): 2374-2399. DOI: 10.7544/issn1000-1239.2021.20210676
    [5]Liu Qixu, Liu Xinyu, Luo Cheng, Wang Junnan, Chen Langping, Liu Jiaxi. Android Browser Fingerprinting Identification Method Based on Bidirectional Recurrent Neural Network[J]. Journal of Computer Research and Development, 2020, 57(11): 2294-2311. DOI: 10.7544/issn1000-1239.2020.20200459
    [6]Yu Diancun, Chen Yiqiang, Peng Xiaohui, Jiao Shuai, Li Xiaohai, Zhong Xi. Multi-Model Data Fusion Based Unobtrusive Identification Method[J]. Journal of Computer Research and Development, 2019, 56(3): 635-642. DOI: 10.7544/issn1000-1239.2019.20170807
    [7]Zhang Degan, Song Xiaodong, Zheng Ke, Liang Yanpin. A Kind of New Anti-Collision Approach Based on AID[J]. Journal of Computer Research and Development, 2015, 52(12): 2725-2735. DOI: 10.7544/issn1000-1239.2015.20140560
    [8]Li Xiaofei, Shen Xuanjing, Chen Haipeng, and Lü Yingda. An Image Identification Algorithm Based on Digital Signature Method[J]. Journal of Computer Research and Development, 2012, 49(6): 1348-1356.
    [9]Wang Bo, Kong Xiangwei, and Fu Haiyan. A Source Camera Identification Method Based on the Combination of OC-SVM and MC-SVM[J]. Journal of Computer Research and Development, 2009, 46(9): 1456-1461.
    [10]Lu Tong, Xi Xiaopeng, Rui Ming, Cai Shijie, and Dou Wanchun. Recognition and Understanding of Architectural Drawings: Model and Algorithm[J]. Journal of Computer Research and Development, 2005, 42(1): 144-152.

Catalog

    Article views (790) PDF downloads (564) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return