0cdf7d371d96d310VgnVCM100000c2b1d38dRCRDapproved/UMICH/stats/Home/News & Events/Archived Events/2011-2012 EventsJoel Vaughan###@###(Tue, 17 Apr 2012)Joel Vaughan###@###(Tue, 17 Apr 2012)411 West HallComputer Network Modeling, Kriging, and Prediction of Computer Network Trafficstats133466760000013346676000009:00 AM<p><b>Title: </b>Computer Network Modeling, Kriging, and Prediction of Computer Network Traffic<br> <b>Co-Chairs: </b>Professor George Michailidis, Associate Professor Stillian Stoev<br> <b>Cognate Member: </b>Assistant Professor Veronica Berrocal<br> <b>Members:</b> Professor Vijay Nair, Professor Kerby Shedden</p> <p><b>Abstract:</b> In order to maintain consistent quality of service, engineers face the task of monitoring the traffic fluctuations on the individual links making up a computer network. However, due to resource constraints and limited access, it is often not possible to directly measure the traffic on all links. This work explores a statistical framework for simultaneously modeling the traffic levels on links across an entire network and using the model to solve a variety of statistical problems, including prediction of traffic on unobserved links and the detection of statistical anomalies. We begin by examining some of the important types of network traffic data and features of the traffic. These features present interesting challenges but also provide important structure that is used throughout this work. We next develop a probabilistic spatio--temporal model for large scale computer networks that is based on physical properties of computer networks. This model simultaneously describes the traffic level on all the links of the network, and how these levels fluctuate over time. We next move on to study the so--called kriging and prediction problems, where we use observed traffic measurements on a small subsets of the links of a network to predict the traffic on other (unobserved) links in the network. We then explore an application of this prediction technique to anomaly detection. Finally, we develop an alternative model that more explicitly incorporates the dependence in traffic that arises due to certain mechanisms in the protocols that govern network behavior. We conclude by discussing the strengths and weaknesses of these two approaches.</p>Njjsantosjjsantos1366829948417dbdf7d371d96d310VgnVCM100000c2b1d38d____once11112newnewEvent Flyer/UMICH/stats/Home/Events/Dissertations and Oral Preliminary Examinations/Joel Vaughan Defense Flyer.pdfJoel Vaughan