Skip to main content

A Network Traffic Classification Method Based on Hierarchical Clustering

  • Conference paper
  • First Online:
Frontiers in Cyber Security (FCS 2020)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1286))

Included in the following conference series:

  • 1111 Accesses

Abstract

With the continuous expansion of civil aviation airport information system, the types and quantities of traffic carried in the network are also increasing rapidly. But during the information system construction, there was no strict sorting of the network traffic types of the information system, and network equipment could not formulate strict network access control policies, which caused the flow data of various information systems to be intertwined and increased the difficulty of information system security maintenance. At the same time, some malicious attack traffic was also mixed, which posed a great threat to the security of information systems. In order to further improve the efficiency of information security protection equipment and improve the recognition rate of abnormal traffic, this paper proposed a network traffic classification method based on hierarchical clustering, which sorts out network traffic in order to find abnormal traffic and improve the protection strategy of network security equipment, thereby improving the network security protection capability of the entire information system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Jiang, D.: The construction of smart city information system based on the Internet of Things and cloud computing. Comput. Commun. 150, 158–166 (2020)

    Article  Google Scholar 

  2. Dovrolis, C. (ed.): PAM 2005. LNCS, vol. 3431. Springer, Heidelberg (2005). https://doi.org/10.1007/b135479

    Book  Google Scholar 

  3. Williams N., et al.: A preliminary performance comparison of five machine learning algorithms for practical IP traffic flow classification. In: ACM Special Interest Group on Data Communication, vol. 36, no. 5, pp. 5–16 (2006)

    Google Scholar 

  4. Huang, C., Dun, J.: A distributed PSO-SVM hybrid system with feature selection and parameter optimization. Appl. Soft Comput. 8(4), 1381–1391 (2008)

    Article  Google Scholar 

  5. Galili, T.: dendextend: an R package for visualizing, adjusting and comparing trees of hierarchical clustering. Bioinformatics 31(22), 3718–3720 (2015)

    Article  Google Scholar 

  6. Arbib, C., Moghaddam, M.T., Muccini, H.: IoT flows: a network flow model application to building evacuation. In: Dell’Amico, M., Gaudioso, M., Stecca, G. (eds.) A View of Operations Research Applications in Italy, 2018. ASS, vol. 2, pp. 115–131. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-25842-9_9

    Chapter  Google Scholar 

  7. Hui-Min Z., Lin-Sheng F., Xue-Huan Q.: Network flow identification strategy based on improved hierarchy CBF. J. Acad. Armored Force Eng. (2018)

    Google Scholar 

  8. Sinha, A., Modiano, E.: Optimal control for generalized network-flow problems. IEEE/ACM Trans. Netw. 26(1), 506–519 (2018)

    Article  Google Scholar 

  9. Mingoti, S.A., Lima, J.O.: Comparing SOM neural network with fuzzy c-means, K-means and traditional hierarchical clustering algorithms. Eur. J. Oper. Res. 174(3), 1742–1759 (2006)

    Article  Google Scholar 

  10. Su, L., et al.: Hierarchical clustering based network traffic data reduction for improving suspicious flow detection. In: 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE) (2018)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yong Ma .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ma, Y., Hu, Y., Cai, C. (2020). A Network Traffic Classification Method Based on Hierarchical Clustering. In: Xu, G., Liang, K., Su, C. (eds) Frontiers in Cyber Security. FCS 2020. Communications in Computer and Information Science, vol 1286. Springer, Singapore. https://doi.org/10.1007/978-981-15-9739-8_34

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-9739-8_34

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-9738-1

  • Online ISBN: 978-981-15-9739-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics