Communications and Networking by Bo Li Lei Shu & Deze Zeng
Author:Bo Li, Lei Shu & Deze Zeng
Language: eng
Format: epub
Publisher: Springer International Publishing, Cham
2 The Concept of Group Behavior
The results of the literature [8] show that more than 98% of IP addresses are no more than 1 km in physical distance for the same C network segment. The survey results about the IP address distribution based on the campus network of Xi’an Jiao Tong University show that the IP address in the same C network segment is distributed in the same dormitory building, that is to say the physical distance is very close. Also the students from the same school are often in the same dormitory, which shows the network users in the same C network segment have the same network requirements, which also provide a reasonable explanation for splitting users in to the group flow model according to the C network segment.
Figure 1 presents the definition of group behavior flow, according to the monitoring location the network are divided into two parts, the internal monitoring network and external network, the internal monitoring network is the network need to be monitored, which is the campus network of Xi’an Jiao Tong University, the external network is the external Internet which composed by the monitoring network communicate with. The network topology can be described by the logical links formed between groups, then the monitoring of network abnormal behaviors can be implemented according to the network traffic distribution on the logical topology. The paper only focuses on the communication between internal network and external network, and the change of the interaction behavior between the internal users and external network.
Fig. 1.Group behavior flow
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
The Mikado Method by Ola Ellnestam Daniel Brolund(25282)
Hello! Python by Anthony Briggs(24335)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(23421)
Kotlin in Action by Dmitry Jemerov(22504)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(21961)
Dependency Injection in .NET by Mark Seemann(21838)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(20707)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(19517)
Grails in Action by Glen Smith Peter Ledbrook(18595)
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(17031)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(15836)
Secrets of the JavaScript Ninja by John Resig & Bear Bibeault(13684)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(11851)
Jquery UI in Action : Master the concepts Of Jquery UI: A Step By Step Approach by ANMOL GOYAL(11151)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10621)
Hit Refresh by Satya Nadella(9188)
The Kubernetes Operator Framework Book by Michael Dame(8563)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8400)
Robo-Advisor with Python by Aki Ranin(8358)