Communications and Networking by Bo Li Lei Shu & Deze Zeng
Author:Bo Li, Lei Shu & Deze Zeng
Language: eng
Format: epub
Publisher: Springer International Publishing, Cham
2 The Concept of Group Behavior
The results of the literature [8] show that more than 98% of IP addresses are no more than 1 km in physical distance for the same C network segment. The survey results about the IP address distribution based on the campus network of Xi’an Jiao Tong University show that the IP address in the same C network segment is distributed in the same dormitory building, that is to say the physical distance is very close. Also the students from the same school are often in the same dormitory, which shows the network users in the same C network segment have the same network requirements, which also provide a reasonable explanation for splitting users in to the group flow model according to the C network segment.
Figure 1 presents the definition of group behavior flow, according to the monitoring location the network are divided into two parts, the internal monitoring network and external network, the internal monitoring network is the network need to be monitored, which is the campus network of Xi’an Jiao Tong University, the external network is the external Internet which composed by the monitoring network communicate with. The network topology can be described by the logical links formed between groups, then the monitoring of network abnormal behaviors can be implemented according to the network traffic distribution on the logical topology. The paper only focuses on the communication between internal network and external network, and the change of the interaction behavior between the internal users and external network.
Fig. 1.Group behavior flow
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Deep Learning with Python by François Chollet(12396)
Hello! Python by Anthony Briggs(9747)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(9634)
The Mikado Method by Ola Ellnestam Daniel Brolund(9630)
Dependency Injection in .NET by Mark Seemann(9158)
Hit Refresh by Satya Nadella(8666)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(8145)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(8012)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(7651)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7648)
Grails in Action by Glen Smith Peter Ledbrook(7561)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(7388)
The Complete Stick Figure Physics Tutorials by Allen Sarah(6957)
The Kubernetes Operator Framework Book by Michael Dame(6782)
Exploring Deepfakes by Bryan Lyon and Matt Tora(6537)
Practical Computer Architecture with Python and ARM by Alan Clements(6491)
Implementing Enterprise Observability for Success by Manisha Agrawal and Karun Krishnannair(6474)
Robo-Advisor with Python by Aki Ranin(6462)
Secrets of the JavaScript Ninja by John Resig & Bear Bibeault(6432)
