Differentiating Internet Applications Using Principal Component Analysis
نویسندگان
چکیده
The number and variety of IP applications had a tremendous increase in the last few years. Besides, Internet applications of end users are changing with the wide spread of high performance PCs connected through broadband links. An accurate mapping of traffic to applications is important for a wide range of network management tasks, like traffic engineering, service differentiation, performance/failure monitoring and security. Since traditional mapping approaches have become increasingly inaccurate, this paper presents a new approach, based on Principal Component Analysis, that is able to identify differentiating characteristics of different Internet applications, including several P2P file sharing protocols. The accuracy of the proposed approach was evaluated by performing a set of intensive tests and the results obtained show that it constitutes a valuable tool to identify peculiar characteristics of Internet applications while being, at the same time, immune to the most important disadvantages presented by other identification methods. We believe this methodology can form the basis for the development of an efficient application identification tool.
منابع مشابه
Feature Dimension Reduction of Multisensor Data Fusion using Principal Component Fuzzy Analysis
These days, the most important areas of research in many different applications, with different tools, are focused on how to get awareness. One of the serious applications is the awareness of the behavior and activities of patients. The importance is due to the need of ubiquitous medical care for individuals. That the doctor knows the patient's physical condition, sometimes is very important. O...
متن کاملExtracting Information from Interval Data Using Symbolic Principal Component Analysis
We address the definition of symbolic variance and covariance for random interval-valued variables, and present four known symbolic principal component estimation methods using a common insightful framework. In addition, we provide a simple explicit formula for the scores of the symbolic principal components, equivalent to the representation by Maximum Covering Area Rectangle. Furthermore, the ...
متن کاملSuspicious Score Based Mechanism to Protect Web Servers against Application Layer Distributed Denial of Service Attacks
Distributed Denial of Service attacks are becoming a serious issue for the developers and the users of the Internet. In recent times, the attackers are targeting the online applications and web services. Detecting such application level attacks are much challenging because the attack traffic mimics the legitimate behaviour. A more sophisticated mechanism is required to detect and mitigate such ...
متن کاملDevelopment of a cell formation heuristic by considering realistic data using principal component analysis and Taguchi’s method
Over the last four decades of research, numerous cell formation algorithms have been developed and tested, still this research remains of interest to this day. Appropriate manufacturing cells formation is the first step in designing a cellular manufacturing system. In cellular manufacturing, consideration to manufacturing flexibility and productionrelated data is vital for cell formation....
متن کاملDigital Forensic Analysis of Internet History Using Principal Component Analysis
-A modern Digital Forensic examination, even on a small-scale home computer typically involves searching large-size hard disk drive storage, a variety of host and web-based applications which may or may not be known to the investigator, and a proliferation of web-based Internet history artefacts that may be highly significant to showing the motivation of a suspect. Faster keyword searching and ...
متن کامل