P2P Network Traffic Analysis Using Data Mining Engines
スポンサーリンク
概要
- 論文の詳細を見る
Characterization of P2P traffic is an essential step before developing workload models towards network capacity planning and counterattacking cyberthreats over P2P networks. In this paper, we present a study on applying data mining techniques to characterize File-Sharing P2P (FSP2P) applications. The proposed scheme supports performance tuning between monitoring cost and system response time. And with the feature selection method presented in this paper, it is further improved towards a lightweight and highly reliable network monitoring and analysis system.
- 2011-07-18
著者
-
INOUE Daisuke
National Institute of Information and Communications Technology
-
NAKAO Koji
National Institute of Information and Communications Technology
-
Guo Shanqing
Shandong University
-
BAN Tao
National Institute of Information and Communications Technology
-
ETO Mahashi
National Institute of Information and Communications Technology
-
Inoue Daisuke
National Institute Of Information And Communicarions Technology
-
Guo Shanquing
Shandong University
関連論文
- O-means: An Optimized Clustering Method for Analyzing Spam Based Attacks
- 招待講演 nicter: An Incident Analysis System for the Global Internet using Correlation between Network Monitoring and Malware Analysis
- 招待講演 nicter: An Incident Analysis System for the Global Internet using Correlation between Network Monitoring and Malware Analysis
- Fine-Grain Feature Extraction from Malware's Scan Behavior Based on Spectrum Analysis
- Malware Sandbox Analysis for Secure Observation of Vulnerability Exploitation
- Automated Malware Analysis System and Its Sandbox for Revealing Malware's Internal and External Activities
- Practical Correlation Analysis between Scan and Malware Profiles against Zero-Day Attacks Based on Darknet Monitoring
- Special Section on Information Theory and Its Applications
- O-means : An Optimized Clustering Method for Analyzing Spam Based Attacks
- A Comparative Study of Unsupervised Anomaly Detection Techniques Using Honeypot Data
- P2P Network Traffic Analysis Using Data Mining Engines
- A Novel Malware Clustering Method Using Frequency of Function Call Traces in Parallel Threads
- An Empirical Evaluation of an Unpacking Method Implemented with Dynamic Binary Instrumentation
- Malware Sandbox Analysis with Efficient Observation of Herder's Behavior
- Malware Sandbox Analysis with Efficient Observation of Herder's Behavior
- Catching the Behavioral Differences between Multiple Executions for Malware Detection
- An Accurate Packer Identification Method Using Support Vector Machine
- Design and Implementation of Security for HIMALIS Architecture of Future Networks
- Catching the Behavioral Differences between Multiple Executions for Malware Detection