Behavior Analysis of Internet Traffic Using Graph and Similarity Matrix
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 127 | Views: 301

Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 12, December 2015 | Popularity: 6.2 / 10


     

Behavior Analysis of Internet Traffic Using Graph and Similarity Matrix

Tejashree A. Deshmukh, Shubhangi Suryawanshi


Abstract: As system activity of utilizations, for example, video spilling and distributed applications proceeds to grow it is difficult task to understand behavior patterns of end host and other network application. Keeping in mind the end goal to comprehend conduct closeness of Internet end has in the same system prefixes bipartite diagrams are utilized to model system activity, and after that one-mode projection diagrams are built for catching social-conduct closeness of end has. At that point by applying a basic and effective algorithm and similarity matrices and cluster coefficient of one mode projection graph, inherent clustered groups of internet application are discovered. Through a vector diagram including coefficient bunching that catch social practices of end hosts, the clusters are found that not just display comparable social conduct of end hosts, additionally have comparable attributes in the accumulated activity.


Keywords: Bipartite graph, Network Security, clusters, One Mode Projection, Profiling


Edition: Volume 4 Issue 12, December 2015


Pages: 830 - 833


DOI: https://www.doi.org/10.21275/NOV152057



Make Sure to Disable the Pop-Up Blocker of Web Browser


Text copied to Clipboard!
Tejashree A. Deshmukh, Shubhangi Suryawanshi, "Behavior Analysis of Internet Traffic Using Graph and Similarity Matrix", International Journal of Science and Research (IJSR), Volume 4 Issue 12, December 2015, pp. 830-833, https://www.ijsr.net/getabstract.php?paperid=NOV152057, DOI: https://www.doi.org/10.21275/NOV152057

Similar Articles

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1884 - 1886

Performance Analysis of Clustal W Algorithm on Linux Cluster

Swati Jasrotia, Salam Din

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Student Project, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022

Pages: 1875 - 1880

Microclustering with Outlier Detection for DADC

Aswathy Priya M.

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 5, May 2024

Pages: 1490 - 1494

An Efficient Secure Data Aggregation Strategy in Wireless Sensor Network using MAC Authentication

Mamta, Dr. Shiva Prakash

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 8 Issue 12, December 2019

Pages: 2057 - 2069

Building Data Replication System Replication System IPFS Nodes Cluster

Ohm Patel

Share this Article

Downloads: 4 | Weekly Hits: ⮙2 | Monthly Hits: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 8, August 2024

Pages: 779 - 789

Machine Learning-Based Detection of Synonymous IP Flood Attacks on Server Infrastructure

Surbhi Batra, Chandra Sekhar Dash

Share this Article
Top