Constructing Communication Profiles by Clustering Selected Network Traffic Attributes


Large-scale IP networks cause special challenges to the security. The network consists of a large number of devices with a vast variety of traffic behavior. Implementation of the intrusion detection and monitoring mechanisms are often ineffective or require a lot of hardware and human resources. In this paper we present a methodology to construct… (More)


5 Figures and Tables

Slides referencing similar topics