81
Views
1
CrossRef citations to date
0
Altmetric
Original Articles

Flow Cluster Algorithm Based on Improved K-means Method

, , &
Pages 326-333 | Published online: 01 Sep 2014
 

Abstract

Traffic classification is currently an important challenge for network management. In recent years, some traffic classification and identification algorithms have been proposed; identifying encrypted application traffic represents an important issue for many network tasks including quality of service. Port number-based classifiers work only for well-known applications and signature-based classifiers are not suitable for encrypted packet payloads. So researchers tend to identify network traffic based on behaviors observed in network application. But the results are so far limited in scope and frequently disappointing. In this paper, flow identification method is proposed to identify network flows based on traffic statistic, which adopt improved k-means cluster algorithm (SA-k-means) to classify traffic, and analyze the impact factor of cluster. Also, experiment results show SA-k-means method is effective.

Additional information

Notes on contributors

Shi Dong

Shi Dong is a Ph.D. candidate in school of computer science and engineering at Southeast University. His major research interests include network security, network management, and network measurement. E-mail: [email protected]

Dingding Zhou

Dingding Zhou is a lecturer of Zhoukou Normal University. Her major research interests include network management and network measurement. E-mail: [email protected]

Wei Ding

Wei Ding received B.S degree in the computer soft from Nanjing University in 1982 respectively, she received M.S, Ph.D degree from Southeast University, in 1987, 1995. Nowadays she is a professor in Southeast University. Her major research interests are in high speed communications, network management, and network security. E-mail: [email protected]

Jian Gong

Jiam Gong received B.S degree in the Computer soft from Nanjing University in 1982. He received Ph.D degree from Southeast University in 1996. Nowadays he is a professor in Southeast University, and his major interests are network management, network security. E-mail: [email protected]

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.