2014
DOI: 10.1109/tnet.2013.2264634
|View full text |Cite
|
Sign up to set email alerts
|

Behavior Analysis of Internet Traffic via Bipartite Graphs and One-Mode Projections

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
41
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 67 publications
(41 citation statements)
references
References 20 publications
0
41
0
Order By: Relevance
“…A similar work is presented by Xu et al [5], who proposed a methodology that analyzes Internet traffic. This methodology first constructs bipartite graphs; after this, it generates onemode projections; then, it builds a similarity matrix and generates clusters with a spectral clustering method; finally, it analyzes the clusters.…”
Section: Related Workmentioning
confidence: 81%
See 1 more Smart Citation
“…A similar work is presented by Xu et al [5], who proposed a methodology that analyzes Internet traffic. This methodology first constructs bipartite graphs; after this, it generates onemode projections; then, it builds a similarity matrix and generates clusters with a spectral clustering method; finally, it analyzes the clusters.…”
Section: Related Workmentioning
confidence: 81%
“…Many authors have proposed using network profiles [3]- [5]. However, these works focus on the traffic at the border to build the profiles, losing visibility of internal attacks.…”
Section: Introductionmentioning
confidence: 99%
“…In the paper, the authors used two clustering methods: -means and method of Cowen and Priebe. Xu et al [21,22] focused on clustering of hosts in the same IP prefixes. They used bipartite graphs to represent hosts' communications in network traffic and described a spectral clustering algorithm for automatic discovery of behaviour clusters in network prefixes based on hosts' communications.…”
Section: Related Workmentioning
confidence: 99%
“…Traffic classification methods are used to provide the efficient realization of the data traffic on network resources, to do user analysis by using network data, to manage and plan network resources, to detect the attacks and the abnormalities on the network [1,2]. Recently, the network traffic classification has been frequently used in order to improve service quality in big networks [3,4], use the network effectively, develop new service packets and perform internet traffic analysis [5].…”
Section: Introductionmentioning
confidence: 99%