Extremal dependence analysis of network sessions
From MaRDI portal
Publication:650747
DOI10.1007/S10687-009-0096-4zbMATH Open1329.62234arXiv0905.1983OpenAlexW2067752637MaRDI QIDQ650747FDOQ650747
Luis López-Oliveros, Sidney I. Resnick
Publication date: 27 November 2011
Published in: Extremes (Search for Journal in Brave)
Abstract: We refine a stimulating study by Sarvotham et al. [2005] which highlighted the influence of peak transmission rate on network burstiness. From TCP packet headers, we amalgamate packets into sessions where each session is characterized by a 5-tuple (S, D, R, Peak R, Initiation T)=(total payload, duration, average transmission rate, peak transmission rate, initiation time). After careful consideration, a new definition of peak rate is required. Unlike Sarvotham et al. [2005] who segmented sessions into two groups labelled alpha and beta, we segment into 10 sessions according to the empirical quantiles of the peak rate variable as a demonstration that the beta group is far from homogeneous. Our more refined segmentation reveals additional structure that is missed by segmentation into two groups. In each segment, we study the dependence structure of (S, D, R) and find that it varies across the groups. Furthermore, within each segment, session initiation times are well approximated by a Poisson process whereas this property does not hold for the data set taken as a whole. Therefore, we conclude that the peak rate level is important for understanding structure and for constructing accurate simulations of data in the wild. We outline a simple method of simulating network traffic based on our findings.
Full work available at URL: https://arxiv.org/abs/0905.1983
Applications of statistics in engineering and industry; control charts (62P30) Statistics of extreme values; tail inference (62G32)
Cites Work
- Title not available (Why is that?)
- An introduction to statistical modeling of extreme values
- Time series: theory and methods.
- A Conditional Approach for Multivariate Extreme Values (with Discussion)
- Statistics of Extremes
- Testing Statistical Hypotheses
- Title not available (Why is that?)
- Statistical inference using extreme order statistics
- Title not available (Why is that?)
- Title not available (Why is that?)
- Residual life time at great age
- A simple general approach to inference about the tail of a distribution
- Title not available (Why is that?)
- Comparison of tail index estimators
- Heavy-Tail Phenomena
- Kernel estimates of the tail index of a distribution
- Estimating the limit distribution of multivariate extremes
- On the estimation of the extreme-value index and large quantile estimation
- Self-similarity in high-speed packet traffic: analysis and modeling of Ethernet traffic measurements
- Bootstrap of the mean in the infinite variance case
- Limit laws for random vectors with an extreme component
- Title not available (Why is that?)
- Title not available (Why is that?)
- Conditioning on an extreme component: model consistency with regular variation on cones
- Some results on the influence of extremes on the bootstrap
- Asymptotic properties of the bootstrap for heavy-tailed distributions
- Necessary conditions for the bootstrap of the mean
- Asymptotic independence and a network traffic model
- Second-order regular variation, convolution and the central limit theorem
- On asymptotic normality of the hill estimator
- Tail estimates motivated by extreme value theory
- On testing extreme value conditions
- Limit theory for multivariate sample extremes
- Testing extreme value conditions
- Approximations to the tail empirical distribution function with application to testing extreme value conditions
- Products of distribution functions attracted to extreme value laws
- The influence of dependence on data network models
- Empirical Testing Of The Infinite Source Poisson Data Traffic Model
- Data network models of burstiness
- Title not available (Why is that?)
- Title not available (Why is that?)
Cited In (3)
Uses Software
This page was built for publication: Extremal dependence analysis of network sessions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q650747)