Clustering analysis for malicious network traffic | IEEE Conference Publication | IEEE Xplore