International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Since Year 2012 | Open Access | Double Blind Reviewed

ISSN: 2319-7064

Downloads: 127

Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 12, December 2015

Behavior Analysis of Internet Traffic Using Graph and Similarity Matrix

Tejashree A. Deshmukh | Shubhangi Suryawanshi [3]

Abstract: As system activity of utilizations, for example, video spilling and distributed applications proceeds to grow it is difficult task to understand behavior patterns of end host and other network application. Keeping in mind the end goal to comprehend conduct closeness of Internet end has in the same system prefixes bipartite diagrams are utilized to model system activity, and after that one-mode projection diagrams are built for catching social-conduct closeness of end has. At that point by applying a basic and effective algorithm and similarity matrices and cluster coefficient of one mode projection graph, inherent clustered groups of internet application are discovered. Through a vector diagram including coefficient bunching that catch social practices of end hosts, the clusters are found that not just display comparable social conduct of end hosts, additionally have comparable attributes in the accumulated activity.

Keywords: Bipartite graph, Network Security, clusters, One Mode Projection, Profiling

Edition: Volume 4 Issue 12, December 2015,

Pages: 830 - 833

How to Download this Article?

Type your Email Address Below, Click Anywhere Outside the Box, That will Activate the Download Button

How to Cite this Article?

Tejashree A. Deshmukh, Shubhangi Suryawanshi, "Behavior Analysis of Internet Traffic Using Graph and Similarity Matrix", International Journal of Science and Research (IJSR), Volume 4 Issue 12, December 2015, pp. 830-833,

Similar Articles with Keyword 'Network Security'

Downloads: 103 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1728 - 1731

Key Management in Wireless Sensor Networks - A Review

Majida C V | Sandhya V [4]

Share this Article

Downloads: 103

Research Paper, Computer Science & Engineering, Bahrain, Volume 5 Issue 10, October 2016

Pages: 1112 - 1116

Network Security Mechanism Based On Static Internet Protocol Addressing

Ahmed D. Asad

Share this Article