Clustering network traffic utilization

Classification of network traffic using distinctive characteristic application is not ideal for P2P and HTTP protocols. This is for the case when a user intercepts the application from other proxy or dynamic port, then the bytes utilization can be manipulated. In this paper, we present a clustering...

Full description

Saved in:
Bibliographic Details
Main Authors: Mohd Khairudin, Nazli, Muda, Zaiton, Mustapha, Aida, Nagarathinam, Yogeswaran, Salleh, Mohd. Sidek
Format: Article
Language:English
Published: Praise Worthy Prize 2013
Online Access:http://psasir.upm.edu.my/id/eprint/30577/1/Clustering%20network%20traffic%20utilization.pdf
http://psasir.upm.edu.my/id/eprint/30577/
Tags: Add Tag
No Tags, Be the first to tag this record!