Presentation on theme: "Abstract There is significant need to improve existing techniques for clustering multivariate network traffic flow record and quickly infer underlying."— Presentation transcript:
1 An Efficient Clustering Scheme to Exploit Hierarchical Data in Network Traffic Analysis
2 AbstractThere is significant need to improve existing techniques for clustering multivariate network traffic flow record and quickly infer underlying traffic patterns.we investigate the use of clustering techniques to identify interesting traffic patterns from network traffic data in an efficient manner.A framework is developed to deal with mixed type attributes including numerical, categorical, and hierarchical attributes.We demonstrate the improved accuracy and efficiency of our approach in clustering network traffic.
3 Existing SystemCategorization based Network monitoring (Auto Focus) techniques.Traffic matrix: The aim of traffic matrix measurement is to estimate the volume of traffic between origin and destination points in the network for capacity planning.Traffic volume: The aim of traffic volume measurement is to determine the total traffic sent or received in a network. Of particular interest is the problem of measuring network usage of customers.Traffic dynamics: The aim of monitoring traffic dynamics is to measure the temporal variation in Internet traffic.Traffic mixture: when traffic volume data is aggregated over time, it can reveal important features of network usage for performance and security management.
4 Disadvantages It does not has Hierarchical Classification DOS Attacker can not be FoundNo Intimation for any violation
5 Proposed SystemHierarchical, distance-based clustering scheme (Echidna).To summarize the main types of traffic flows that are observed in a network.Introduction of a new distance measure for hierarchically structured attributes such as IP addresses and a set of heuristics.Summarize and compress reports of significant traffic clusters from a hierarchical clustering algorithm.
6 Advantages It has System based Hierarchical Classification Efficient Network Traffic MonitoringInfer of underlying patterns for multivariate traffic flowsIt Identify DOS Attack
7 Modules Tree construction Traffic analysis System classification Network management
8 Requirement Analysis SOFTWARE REQUIREMENTS:- HARDWARE REQUIREMENTS:- Operating system : Windows XP Professional.Language Used : Java 1.6 (Swings ,AWT ,Sockets)Database : SQL Server 2000HARDWARE REQUIREMENTS:-Hard disk : 80 GBRAM : 1 GBProcessor : Pentium IV 3.3 GHz