Clustering Network Traffic Utilization


(*) Corresponding author


Authors' affiliations


DOI's assignment:
the author of the article can submit here a request for assignment of a DOI number to this resource!
Cost of the service: euros 10,00 (for a DOI)

Abstract


Classification of network traffic using distinctive characteristic application is not ideal for P2P and HTTP protocols. This is for the case when a user intercepts the application from other proxy or dynamic port, then the bytes utilization can be manipulated. In this paper, we present a clustering approach for network traffic classification using information from one particular port. The clustering experiments were conducted using three different clustering algorithms, which are K-Means, DBScan and AutoClass. The analysis discussed on the quality of resulting clusters from all the algorithms.
Copyright © 2013 Praise Worthy Prize - All rights reserved.

Keywords


AutoClass; Clustering; DBScan; K-Means; Network Traffic Utilization

Full Text:

PDF


References


A. Hushyar, Network Traffic Clustering and Geographic Visualization. Masters Thesis, San Jose State University, 2009.

J. Han, M. Kamber, Data Mining: Concepts and Techniques (Morgan Kaufmann Publishers, 2001).

M. Berry, G. Linoff, Mastering Data Mining: The Art and Science of Customer Relationship Management (Wiley Computer Publishers, 2000).

M. Sassi, A. Grissa Touzi, H. Ounelli, A Multiple Aspect Data Model Design for Knowledge Discovery in Databases,(2008) International Review on Computers and Software (IRECOS), 3 (2), pp.133-140.

T. Karagiannis, A. Broido, M. Faloutsos, and K. Claffy. Transport Layer Identification of P2P Traffic, Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement (Page: 121-134, Year of Publication: 2004).

J. Erman, M. Arlitt, and A. Mahanti, Traffic Classification using Clustering Algorithms, Proceedings of the 2006 SIGCOMM Workshop on Mining Network Data (Page: 281-286, Year of Publication: 2006).

Sarwar Hadi, Rizwan Beg, Sheenu Rizvi, An Intelligent Tree Based Clustering Method for Large Multi Dimensional Data, (2009) International Review on Computers and Software (IRECOS), 4 (6), pp. 648-651.

A.W. Moore and K. Papagiannaki, Towards the Accurate Identification of Network Applications, Proceedings of Sixth Passive and Active Measurement Workshop (Year of Publication: 2005).

K. Jain, R. C. Dubes, Algorithms for Clustering Data (Prentice Hall, 1988).

I.H. Witten, E. Frank, Data Mining: Practical Machine Learning Tools and Techniques (Morgan Kaufmann, 2005).

A. McGregor, M. Hall, P. Lorier, and J. Brunskill, Flow Clustering using Machine Learning Techniques, Proceedings of Passive and Active Network Measurement (Publication Year: 2004).

S. Zander, T. Nguyen, and G. Armitage, Automated Traffic Classification and Application Identification using Machine Learning, Proceedings of Sixth Passive and Active Measurement Workshop (Year of Publication: 2005).

M. Hall, E. Frank, G. Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.H., The WEKA data mining software: An update, SIGKDD Explorations, Volume 11, Issue 1, 2009.


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize