Cybermetrics: User Identification through Network Flow Analysis
نویسندگان
چکیده
Recent studies on user identification focused on behavioral aspects of biometric patterns, such as keystroke dynamics or activity cycles in on-line games. The aim of our work is to identify users through the detection and analysis of characteristic network flow patterns. The transformation of concepts from the biometric domain into the network domain leads to the concept of a cybermetric pattern — a pattern that identifies a user based on her characteristic Internet activity.
منابع مشابه
Behavioral Analysis of Traffic Flow for an Effective Network Traffic Identification
Fast and accurate network traffic identification is becoming essential for network management, high quality of service control and early detection of network traffic abnormalities. Techniques based on statistical features of packet flows have recently become popular for network classification due to the limitations of traditional port and payload based methods. In this paper, we propose a metho...
متن کاملCalculation of Leakage in Water Supply Network Based on Blind Source Separation Theory
The economic and environmental losses due to serious leakage in the urban water supply network have increased the effort to control the water leakage. However, current methods for leakage estimation are inaccurate leading to the development of ineffective leakage controls. Therefore, this study proposes a method based on the blind source separation theory (BSS) to calculate the leakage of water...
متن کاملOptimal Harmonization of Out-Network Traffic Control Regulations in Social Networks
Regulations of use of social networks, as one of the key components in these networks, serve an important role in controlling the flow of traffic. The study of the harmonization of these terms and regulations can be a significant step to avoid congestion and (Users’) rejection in the network. Harmonization of traffic control regulations (TCR) among social networks is one of the best solutions t...
متن کاملOptimization of the Implementation of Tara Program Based on Identification, Analysis and Prioritization of Effective Factors through A Fuzzy Network Analysis (FANP) Technique
Abstract Being constantly reviewed and reformed, the strategy of dynamic and systematic strengthening of tax structures of countries has undeniable impacts on the economic development of countries. The Tax Administration and Revenue Automation (TARA) Program has been designed with such a goal and in line with the macro- policies of the Iranian government, but it has not been able to move forwa...
متن کاملFeature Extraction to Identify Network Traffic with Considering Packet Loss Effects
There are huge petitions of network traffic coming from various applications on Internet. In dealing with this volume of network traffic, network management plays a crucial rule. Traffic classification is a basic technique which is used by Internet service providers (ISP) to manage network resources and to guarantee Internet security. In addition, growing bandwidth usage, at one hand, and limit...
متن کامل