{"id":346,"date":"2010-12-28T14:20:14","date_gmt":"2010-12-28T13:20:14","guid":{"rendered":"http:\/\/dbdmg.polito.it\/wordpress\/?page_id=346"},"modified":"2011-01-10T13:52:58","modified_gmt":"2011-01-10T12:52:58","slug":"network-traffic-analysis","status":"publish","type":"page","link":"https:\/\/dbdmg.polito.it\/wordpress\/research\/network-traffic-analysis\/","title":{"rendered":"Network traffic analysis"},"content":{"rendered":"<h2>Motivation<\/h2>\n<p style=\"text-align: justify;\">The continuous growth in network speed allows huge amounts of data to be  transferred through a network. An important issue in this context is  network traffic analysis to characterize traffic profile and detect  Internet security threats. Association rule extraction is a widely used  exploratory technique which has been exploited in different contexts  (e.g., network traffic characterization). Association rule extraction  from network flows, driven by support and confidence constraints,  involves (i) generation of a huge number of rules which are difficult to  analyze and (ii) pruning rare itemsets even if their hidden knowledge  might be relevant.<\/p>\n<h2>Generalized association rule algorithm<\/h2>\n<p style=\"text-align: justify;\">To address the above issues, we propose a novel approach to analyze  network data by means of generalized association rules, which provide a  high level abstraction of the network traffic. The proposed technique  exploits (user provided) taxonomies to drive the pruning phase of the  extraction process. Generalized association rules provide a powerful  tool to efficiently extract hidden knowledge which would be discarded by  previous approaches.<\/p>\n<p><a href=\"..\/..\/twiki\/pub\/Public\/NetworkTrafficAnalysis\/BaralisetAl.pdf\" target=\"_top\"><\/a><a href=\"http:\/\/dbdmg.polito.it\/wordpress\/wp-content\/uploads\/2010\/12\/BaralisetAl.pdf\">Technical report<\/a>: E. Baralis, T. Cerquitelli, and V. D&#8217;Elia. Generalized itemset discovery by means of opportunistic aggregation.<\/p>\n<h2>The NetMine framework<\/h2>\n<p style=\"text-align: justify;\">The NetMine framework allows the characterization of traffic data by  means of data mining techniques. NetMine performs generalized  association rule extraction to profile communications, detect anomalies,  and identify recurrent patterns. Association rule extraction is a  widely used exploratory technique to discover hidden correlations among  data. However, it is usually driven by frequency constraints on the  extracted correlations. Hence, it entails (i) generating a huge number  of rules which are difficult to analyze, or (ii) pruning rare itemsets  even if their hidden knowledge might be relevant. To overcome these  issues NetMine exploits a novel algorithm to efficiently extract  generalized association rules, which provide a high level abstraction of  the network traffic and allows the discovery of unexpected and more  interesting traffic rules. The proposed technique exploits (user  provided) taxonomies to drive the pruning phase of the extraction  process. Extracted correlations are automatically aggregated in more  general association rules according to a frequency threshold.  Eventually, extracted rules are classified into groups according to  their semantic meaning, thus allowing a domain expert to focus on the  most relevant patterns. Experiments performed on different network dumps  showed the efficiency and effectiveness of the NetFrame framework to  characterize traffic data.<\/p>\n<h2>Publications<\/h2>\n<div class=\"teachpress_pub_list\"><form name=\"tppublistform\" method=\"get\"><a name=\"tppubs\" id=\"tppubs\"><\/a><\/form><div class=\"teachpress_message_error\"><p>Sorry, no publications matched your criteria.<\/p><\/div><\/div>\n<br class=\"fixfloat\" \/>","protected":false},"excerpt":{"rendered":"<p>Motivation The continuous growth in network speed allows huge amounts of data to be transferred through a network. An important issue in this context is network traffic analysis to characterize traffic profile and detect Internet security threats. Association rule extraction is a widely used exploratory technique which has been exploited in different contexts (e.g., network<a href=\"https:\/\/dbdmg.polito.it\/wordpress\/research\/network-traffic-analysis\/\">[&#8230;]<\/a><\/p>\n","protected":false},"author":2,"featured_media":438,"parent":98,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-346","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/dbdmg.polito.it\/wordpress\/wp-json\/wp\/v2\/pages\/346","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dbdmg.polito.it\/wordpress\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/dbdmg.polito.it\/wordpress\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/dbdmg.polito.it\/wordpress\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/dbdmg.polito.it\/wordpress\/wp-json\/wp\/v2\/comments?post=346"}],"version-history":[{"count":13,"href":"https:\/\/dbdmg.polito.it\/wordpress\/wp-json\/wp\/v2\/pages\/346\/revisions"}],"predecessor-version":[{"id":1059,"href":"https:\/\/dbdmg.polito.it\/wordpress\/wp-json\/wp\/v2\/pages\/346\/revisions\/1059"}],"up":[{"embeddable":true,"href":"https:\/\/dbdmg.polito.it\/wordpress\/wp-json\/wp\/v2\/pages\/98"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dbdmg.polito.it\/wordpress\/wp-json\/wp\/v2\/media\/438"}],"wp:attachment":[{"href":"https:\/\/dbdmg.polito.it\/wordpress\/wp-json\/wp\/v2\/media?parent=346"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}