2022
DOI: 10.32604/cmes.2022.017467
|View full text |Cite
|
Sign up to set email alerts
|

Unsupervised Binary Protocol Clustering Based on Maximum Sequential Patterns

Abstract: With the rapid development of the Internet, a large number of private protocols emerge on the network. However, some of them are constructed by attackers to avoid being analyzed, posing a threat to computer network security. The blockchain uses the P2P protocol to implement various functions across the network. Furthermore, the P2P protocol format of blockchain may differ from the standard format specification, which leads to sniffing tools such as Wireshark and Fiddler not being able to recognize them. Theref… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 45 publications
(47 reference statements)
0
4
0
Order By: Relevance
“…Cluster analysis has also been used in supporting consensus protocols [152][153][154][155][156][157][158][159][160] For example, Khenfouci et al [125], to avoid data tampering and fraudulent activities, developed a customized clustering-based consensus protocol to carry out a decentralized consensus mechanism, according to which the k-Means was applied locally by multiple competitive miners. The methodology comprised four layers (i.e., data layer, network layer, blockchain layer, and machine learning layer) and had two main actors: management and miner.…”
Section: Category 1: Solitary Implementation Of Unsupervised Learningmentioning
confidence: 99%
“…Cluster analysis has also been used in supporting consensus protocols [152][153][154][155][156][157][158][159][160] For example, Khenfouci et al [125], to avoid data tampering and fraudulent activities, developed a customized clustering-based consensus protocol to carry out a decentralized consensus mechanism, according to which the k-Means was applied locally by multiple competitive miners. The methodology comprised four layers (i.e., data layer, network layer, blockchain layer, and machine learning layer) and had two main actors: management and miner.…”
Section: Category 1: Solitary Implementation Of Unsupervised Learningmentioning
confidence: 99%
“…For the first experiment, the results are shown in Tables 8-10; and the second experimental results are shown in Table 11. In addition, since the UCI datasets are usually more complex than those 2-D synthetic datasets, we conduct the first experiment on only UCI datasets; and in terms of the evaluation metrics, to ensure the reliability of the conclusions, we finally adopt three IVIs (i.e., Sil, CH and DB) and six EVIs (i.e., Adjusted Rand Index (ARI), Adjusted Mutual Information (AMI), Homogeneity Score (HOM), Compactness Score (COM), V_measure (V) and Fowlkes and Mallows Index (FMI)) to evaluate the clustering results, which are described in [10,33,34]; except for the DB, all the other indices are found to have the better clustering performance with larger measure values. In addition, Table 10 records the experimental results of the NSDK-means++ and other clustering algorithms; and any evaluation value with better performance than the NSDK-means++ is presented in bold.…”
Section: Performance Evaluation Of the Bwcon-nsdk-means++ Algorithmmentioning
confidence: 99%
“…The coefficient of a signal has been obtained by computing each critical band of the MFCCs signal s individually using l, where s consists of n samples in the current frame. i denotes the current sample of the signal, while f i refers to the total number of sample signals within each frame [28]. The discrete cosine transform contributes to the reduced correlation observed among the MFCCs features.…”
Section: Inertial Sensors Based Features Extractionmentioning
confidence: 99%