Clustering network traffic utilization
Classification of network traffic using distinctive characteristic application is not ideal for P2P and HTTP protocols. This is for the case when a user intercepts the application from other proxy or dynamic port, then the bytes utilization can be manipulated. In this paper, we present a clustering...
Auteurs principaux: | , , , , |
---|---|
Format: | Article |
Langue: | English |
Publié: |
Praise Worthy Prize
2013
|
Accès en ligne: | http://psasir.upm.edu.my/id/eprint/30577/1/Clustering%20network%20traffic%20utilization.pdf |