{"id":2618,"date":"2011-11-17T10:37:59","date_gmt":"2011-11-17T09:37:59","guid":{"rendered":"http:\/\/dbdmg.polito.it\/wordpress\/?page_id=2618"},"modified":"2015-01-07T15:19:01","modified_gmt":"2015-01-07T14:19:01","slug":"network-analysis","status":"publish","type":"page","link":"https:\/\/dbdmg.polito.it\/wordpress\/theses\/network-analysis\/","title":{"rendered":"Network analysis"},"content":{"rendered":"<h3>Network traffic data analysis<\/h3>\n<h3>Tutor<\/h3>\n<a href=\"https:\/\/dbdmg.polito.it\/wordpress\/people\/tania-cerquitelli\/\">Tania Cerquitelli<\/a>\n<h4>Description<\/h4>\n<p>Due to the continuous growth in network speed, terabytes of data may be transferred through a network every day.\u00a0An important issue in this context is network traffic analysis to characterize traffic profile and detect Internet security threats.<\/p>\n<p>To efficiently analyze large network traffic traces novel and ad-hoc data mining algorithms need to be designed and developed.<\/p>\n<p><em>Applications<\/em><\/p>\n<div>\n<div>Analysis of wireless network traffic captures<\/div>\n<ul>\n<li>wireless traffic monitoring by exploiting itemset\u00a0 mining algorithms<\/li>\n<li>wireless traffic classification by exploiting association rules and probabilistic models<\/li>\n<\/ul>\n<div><\/div>\n<\/div>\n<div>Analysis of wired network traffic captures<\/div>\n<ul>\n<li>wired traffic characterization by exploiting data mining techniques (e.g., clustering, classification)<\/li>\n<li>wired traffic monitoring by exploiting data mining techniques (e.g., generalized itemset mining)<\/li>\n<\/ul>\n<br class=\"fixfloat\" \/>","protected":false},"excerpt":{"rendered":"<p>Network traffic data analysis Tutor Description Due to the continuous growth in network speed, terabytes of data may be transferred through a network every day.\u00a0An important issue in this context is network traffic analysis to characterize traffic profile and detect Internet security threats. To efficiently analyze large network traffic traces novel and ad-hoc data mining<a href=\"https:\/\/dbdmg.polito.it\/wordpress\/theses\/network-analysis\/\">[&#8230;]<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"parent":2369,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2618","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/dbdmg.polito.it\/wordpress\/wp-json\/wp\/v2\/pages\/2618","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dbdmg.polito.it\/wordpress\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/dbdmg.polito.it\/wordpress\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/dbdmg.polito.it\/wordpress\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/dbdmg.polito.it\/wordpress\/wp-json\/wp\/v2\/comments?post=2618"}],"version-history":[{"count":17,"href":"https:\/\/dbdmg.polito.it\/wordpress\/wp-json\/wp\/v2\/pages\/2618\/revisions"}],"predecessor-version":[{"id":7717,"href":"https:\/\/dbdmg.polito.it\/wordpress\/wp-json\/wp\/v2\/pages\/2618\/revisions\/7717"}],"up":[{"embeddable":true,"href":"https:\/\/dbdmg.polito.it\/wordpress\/wp-json\/wp\/v2\/pages\/2369"}],"wp:attachment":[{"href":"https:\/\/dbdmg.polito.it\/wordpress\/wp-json\/wp\/v2\/media?parent=2618"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}