International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 127

Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 12, December 2015


Behavior Analysis of Internet Traffic Using Graph and Similarity Matrix

Tejashree A. Deshmukh | Shubhangi Suryawanshi [3]


Abstract: As system activity of utilizations, for example, video spilling and distributed applications proceeds to grow it is difficult task to understand behavior patterns of end host and other network application. Keeping in mind the end goal to comprehend conduct closeness of Internet end has in the same system prefixes bipartite diagrams are utilized to model system activity, and after that one-mode projection diagrams are built for catching social-conduct closeness of end has. At that point by applying a basic and effective algorithm and similarity matrices and cluster coefficient of one mode projection graph, inherent clustered groups of internet application are discovered. Through a vector diagram including coefficient bunching that catch social practices of end hosts, the clusters are found that not just display comparable social conduct of end hosts, additionally have comparable attributes in the accumulated activity.


Keywords: Bipartite graph, Network Security, clusters, One Mode Projection, Profiling


Edition: Volume 4 Issue 12, December 2015,


Pages: 830 - 833


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Tejashree A. Deshmukh, Shubhangi Suryawanshi, "Behavior Analysis of Internet Traffic Using Graph and Similarity Matrix", International Journal of Science and Research (IJSR), Volume 4 Issue 12, December 2015, pp. 830-833, https://www.ijsr.net/get_abstract.php?paper_id=NOV152057

Similar Articles with Keyword 'Network Security'

Downloads: 4 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Informative Article, Computer Science & Engineering, India, Volume 11 Issue 8, August 2022

Pages: 1497 - 1500

Innovative Approach to Mitigate Man-in-the-Middle Attacks in Secure Communication Channels

Arnab Dey [9]

Share this Article

Downloads: 4 | Weekly Hits: ⮙2 | Monthly Hits: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 8, August 2024

Pages: 779 - 789

Machine Learning-Based Detection of Synonymous IP Flood Attacks on Server Infrastructure

Surbhi Batra | Chandra Sekhar Dash

Share this Article
Top