摘要 |
The subject matter of this document can be implemented in, among other things, a method that includes receiving network traffic associated with a computing device, the network traffic including packet flows communicated between the computing device and a network. The method also includes monitoring the network traffic over time, and identifying a plurality of network usage characteristics associated with the network traffic. The network usage characteristics include a usage time that corresponds to an amount of time the computing device has been consuming network resources and a network application identifier that corresponds to a network application being used by the computing device. The method also includes determining whether the network traffic violates a network usage policy based on two or more of the network usage characteristics, and decreasing, over a period of time, throughput of the network traffic that is determined to be violative of the network usage policy.
|