Downloads: 127 | Views: 301
Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 12, December 2015 | Popularity: 6.2 / 10
Behavior Analysis of Internet Traffic Using Graph and Similarity Matrix
Tejashree A. Deshmukh, Shubhangi Suryawanshi
Abstract: As system activity of utilizations, for example, video spilling and distributed applications proceeds to grow it is difficult task to understand behavior patterns of end host and other network application. Keeping in mind the end goal to comprehend conduct closeness of Internet end has in the same system prefixes bipartite diagrams are utilized to model system activity, and after that one-mode projection diagrams are built for catching social-conduct closeness of end has. At that point by applying a basic and effective algorithm and similarity matrices and cluster coefficient of one mode projection graph, inherent clustered groups of internet application are discovered. Through a vector diagram including coefficient bunching that catch social practices of end hosts, the clusters are found that not just display comparable social conduct of end hosts, additionally have comparable attributes in the accumulated activity.
Keywords: Bipartite graph, Network Security, clusters, One Mode Projection, Profiling
Edition: Volume 4 Issue 12, December 2015
Pages: 830 - 833
DOI: https://www.doi.org/10.21275/NOV152057
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 1
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1884 - 1886Performance Analysis of Clustal W Algorithm on Linux Cluster
Swati Jasrotia, Salam Din
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Student Project, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022
Pages: 1875 - 1880Microclustering with Outlier Detection for DADC
Aswathy Priya M.
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 5, May 2024
Pages: 1490 - 1494An Efficient Secure Data Aggregation Strategy in Wireless Sensor Network using MAC Authentication
Mamta, Dr. Shiva Prakash
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Analysis Study Research Paper, Computer Science & Engineering, India, Volume 8 Issue 12, December 2019
Pages: 2057 - 2069Building Data Replication System Replication System IPFS Nodes Cluster
Ohm Patel
Downloads: 4 | Weekly Hits: ⮙2 | Monthly Hits: ⮙4
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 8, August 2024
Pages: 779 - 789Machine Learning-Based Detection of Synonymous IP Flood Attacks on Server Infrastructure
Surbhi Batra, Chandra Sekhar Dash