Download presentation
Published byLauren Byrne Modified over 11 years ago
1
An Efficient Clustering Scheme to Exploit Hierarchical Data in Network Traffic Analysis
2
Abstract There is significant need to improve existing techniques for clustering multivariate network traffic flow record and quickly infer underlying traffic patterns. we investigate the use of clustering techniques to identify interesting traffic patterns from network traffic data in an efficient manner. A framework is developed to deal with mixed type attributes including numerical, categorical, and hierarchical attributes. We demonstrate the improved accuracy and efficiency of our approach in clustering network traffic.
3
Existing System Categorization based Network monitoring (Auto Focus) techniques. Traffic matrix: The aim of traffic matrix measurement is to estimate the volume of traffic between origin and destination points in the network for capacity planning. Traffic volume: The aim of traffic volume measurement is to determine the total traffic sent or received in a network. Of particular interest is the problem of measuring network usage of customers. Traffic dynamics: The aim of monitoring traffic dynamics is to measure the temporal variation in Internet traffic. Traffic mixture: when traffic volume data is aggregated over time, it can reveal important features of network usage for performance and security management.
4
Disadvantages It does not has Hierarchical Classification
DOS Attacker can not be Found No Intimation for any violation
5
Proposed System Hierarchical, distance-based clustering scheme (Echidna). To summarize the main types of traffic flows that are observed in a network. Introduction of a new distance measure for hierarchically structured attributes such as IP addresses and a set of heuristics. Summarize and compress reports of significant traffic clusters from a hierarchical clustering algorithm.
6
Advantages It has System based Hierarchical Classification
Efficient Network Traffic Monitoring Infer of underlying patterns for multivariate traffic flows It Identify DOS Attack
7
Modules Tree construction Traffic analysis System classification
Network management
8
Requirement Analysis SOFTWARE REQUIREMENTS:- HARDWARE REQUIREMENTS:-
Operating system : Windows XP Professional. Language Used : Java 1.6 (Swings ,AWT ,Sockets) Database : SQL Server 2000 HARDWARE REQUIREMENTS:- Hard disk : 80 GB RAM : 1 GB Processor : Pentium IV 3.3 GHz
9
THANK YOU
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.