Detecting a Proficient Flow Label Propagation from Network Traffic Classification
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2
Abstract
The system model in a traffic classification method introduces the threefunctions that are flow label,propagation, nearest cluster based classifier and compound classification. For some special cases, the flow label propagation is critical to require that the labeled flows and unlabelled flows must be captured on the same network in a short period of time. In flow label propagation the peer whose initial flow we have labeled may be off-line, so no other peer will connect to it and flow label propagation is useless for this case. Same for servers, say, and FTP server is popular on a network, and then you will correctly propagate flow information to all other hosts connecting to that server. However, if the server changes its IP address (without changing its DNS name), then will fail to propagate its label. For these type of case propose a alter flow label propagation and also detect the unknown flow in the network
Authors and Affiliations
S. K. Murugaraja , R. Rameshkumar , K. Sarathkumar
Progressivism, Modernism and Urdu Literature.A Comparative View
Abstract:The paper seeks to explore the holocaust of partition in the subcontinent after the great political divide erupting from 1946 massacre which produced writers like Bedi, Manto and Khwaja Ahmad Abbas. A modest att...
Development of Intelligent Traffic Light System Based On Congestion Estimation Using Fuzzy Logic
Abstract: Vehicular traffic is the major problem which every country faces because of the increase in number of vehicles throughout the world, especially in large urban areas. In a conventional traffic light contro...
Intelligent Phishing Website Detection and Prevention System by Using Link Guard Algorithm
Phishing is a new type of network attack where the attacker creates a replica of an existing Web page to fool users (e.g., by using specially designed e-mails or instant messages) into submitting personal, financ...
A Cryptographic Key Generation on a 2D Graphics using RGB pixel Shuffling and Transposition
Abstract: Now a day with incredible change in social media network such as mobile communication and computer, all type of a data such as audio, video, images are used for the communication .Privacy for that data is an im...
Visual Representations in High School Edublogs
Abstract: Visuals speak a language of their own. In fact, they can have more impact than words. Whenprepared intuitively, they have the power to overcome regional barriers, in terms of comprehensibility of verballa...