Abstract
With the continuous expansion of civil aviation airport information system, the types and quantities of traffic carried in the network are also increasing rapidly. But during the information system construction, there was no strict sorting of the network traffic types of the information system, and network equipment could not formulate strict network access control policies, which caused the flow data of various information systems to be intertwined and increased the difficulty of information system security maintenance. At the same time, some malicious attack traffic was also mixed, which posed a great threat to the security of information systems. In order to further improve the efficiency of information security protection equipment and improve the recognition rate of abnormal traffic, this paper proposed a network traffic classification method based on hierarchical clustering, which sorts out network traffic in order to find abnormal traffic and improve the protection strategy of network security equipment, thereby improving the network security protection capability of the entire information system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Jiang, D.: The construction of smart city information system based on the Internet of Things and cloud computing. Comput. Commun. 150, 158–166 (2020)
Dovrolis, C. (ed.): PAM 2005. LNCS, vol. 3431. Springer, Heidelberg (2005). https://doi.org/10.1007/b135479
Williams N., et al.: A preliminary performance comparison of five machine learning algorithms for practical IP traffic flow classification. In: ACM Special Interest Group on Data Communication, vol. 36, no. 5, pp. 5–16 (2006)
Huang, C., Dun, J.: A distributed PSO-SVM hybrid system with feature selection and parameter optimization. Appl. Soft Comput. 8(4), 1381–1391 (2008)
Galili, T.: dendextend: an R package for visualizing, adjusting and comparing trees of hierarchical clustering. Bioinformatics 31(22), 3718–3720 (2015)
Arbib, C., Moghaddam, M.T., Muccini, H.: IoT flows: a network flow model application to building evacuation. In: Dell’Amico, M., Gaudioso, M., Stecca, G. (eds.) A View of Operations Research Applications in Italy, 2018. ASS, vol. 2, pp. 115–131. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-25842-9_9
Hui-Min Z., Lin-Sheng F., Xue-Huan Q.: Network flow identification strategy based on improved hierarchy CBF. J. Acad. Armored Force Eng. (2018)
Sinha, A., Modiano, E.: Optimal control for generalized network-flow problems. IEEE/ACM Trans. Netw. 26(1), 506–519 (2018)
Mingoti, S.A., Lima, J.O.: Comparing SOM neural network with fuzzy c-means, K-means and traditional hierarchical clustering algorithms. Eur. J. Oper. Res. 174(3), 1742–1759 (2006)
Su, L., et al.: Hierarchical clustering based network traffic data reduction for improving suspicious flow detection. In: 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE) (2018)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Ma, Y., Hu, Y., Cai, C. (2020). A Network Traffic Classification Method Based on Hierarchical Clustering. In: Xu, G., Liang, K., Su, C. (eds) Frontiers in Cyber Security. FCS 2020. Communications in Computer and Information Science, vol 1286. Springer, Singapore. https://doi.org/10.1007/978-981-15-9739-8_34
Download citation
DOI: https://doi.org/10.1007/978-981-15-9739-8_34
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-9738-1
Online ISBN: 978-981-15-9739-8
eBook Packages: Computer ScienceComputer Science (R0)