From IP port numbers to ADSL customer segmentation
|
|
- Jayson Blankenship
- 8 years ago
- Views:
Transcription
1 From IP port numbers to ADSL customer segmentation F. Clérot France Télécom R&D
2 Overview ADSL customer segmentation: why? how? Technical approach and synopsis Data pre-processing The many faces of a Kohonen map A glance at the results
3 Overview ADSL customer segmentation: why? how? Technical approach and synopsis Data pre-processing The many faces of a Kohonen map A glance at the results
4 ADSL customer segmentation PURPOSE Fine-grain understanding of the customer behaviour Anticipate (at least detect) changes in behaviour patterns
5 ADSL customer segmentation WHY? Rapidly expanding market Strong competition Fast adoption of new applications (P2P, streaming) by some segments
6 ADSL customer segmentation HOW? Bandwidth? Rather easy Big users vs. small users classification Usefull for network dimensionning Limited use for market understanding
7 ADSL customer segmentation HOW? Usage? More difficult: define what a «usage» is If successfull, will lead to a better understanding of the market If successfull, may also be usefull for network dimensionning: usage determines bandwidth
8 ADSL customer segmentation DATA?
9 Capture : BAS IP backbone sonde Office DSLAM Observation point: ATM on STM1 Telephone LAN ATU-R Filter DSLAM ATM Telephone Filter ATU-R Home
10 Data : IP and TCP relevant header fields For our purposes : VP/VC (customer Id) Time granularity, 6 minute periods Volumes (upstream and downstream) per IP port About 800 customers, one month of data
11 Overview ADSL customer segmentation: why? how? Technical approach and synopsis Data pre-processing The many faces of a Kohonen map A glance at the results
12 Technical approach Segmentation of ADSL clients based on their activities: clustering with Kohonen maps Use minimum a priori knowledge Timescale: activity defined on a daily basis Representation: retain only the ports having the greatest volumes
13 Synopsis of the analysis Data pre-processing Volumes are too correlated to applications to be informative: order statistics Three steps for a double clustering First, cluster the «atomic» activities to define what the «typical activities» are Second, project customers on such «typical activities» Third, cluster the customers
14 Discover Typical Activities : LOG FILE Client1 Day1 RankVol11 Client1 Day2 RankVol12 Client2 Day1 RankVol21 Client2 Day3 RankVol23 Client2 Day5 RankVol25 Client3 Day2 RankVol32 Client4 Day4 RankVol44 Client4 Day5 RankVol45 Client5 Day6 RankVol56... Typical Day 2 RankVolume Space Typical Day 3 Clustering of the Days In the RankVolume space + Clustering of the IP ports Typical Day 1 Typical Day 4
15 Project customers on typical LOG FILE activities : Client1 Day1 RankVol11 Client1 Day2 RankVol12 Client2 Day1 RankVol21 Client2 Day3 RankVol23 Client2 Day5 RankVol25 Client3 Day2 RankVol32 Client4 Day4 RankVol44 Client4 Day5 RankVol45 Client5 Day6 RankVol56... Typical Day 2 RankVolume Space Typical Day 3... Client2 (1, 1, 0, 1)... Project the customers on the «typical days»: Customer Profiles Typical Day 1 Typical Day 4
16 Discover Typical Customers : Client1 CustomerProfile1 Client2 CustomerProfile2 Client3 CustomerProfile3 Typical Days Space Clustering of the Customers in the Typical Days Space
17 Overview ADSL customer segmentation: why? how? Technical approach and synopsis Data pre-processing The many faces of a Kohonen map A glance at the results
18 Data pre-processing : Raw volumes hide the relevant information: Typical volumes used by applications span many orders of magnitude : a big user will very likely consume less volume thana small P2P user! Simple-minded normalisation does not help much : Heavy-tailed distributions
19 Example of distribution
20 Data pre-processing : Use rank statistics to represent each day : Sort the volumes according to all the volumes for the same port in the log file Use the rank as a representation for the day on this port
21 Data pre-processing : Raw Volumes ClientId TimeStamp E- mail P2P Client 1 Day Client 1 Day Client 2 Day Client 2 Day Client 2 Day Client 3 Day Client 3 Day Client 4 Day Client 4 Day3 2 0 Client 4 Day Rank Volumes ClientId TimeStamp E- mail P2P Client 1 Day1 7 2 Client 1 Day2 9 6 Client 2 Day1 2 6 Client 2 Day2 7 1 Client 2 Day4 2 6 Client 3 Day3 1 4 Client 3 Day4 2 9 Client 4 Day2 9 3 Client 4 Day3 6 9 Client 4 Day4 5 4
22 Overview ADSL customer segmentation: why? how? Technical approach and synopsis Data pre-processing The many faces of a Kohonen map A glance at the results
23 The many faces of a Kohonen map: Kohonen map??? «Collaborative» K-means Collaboration is enforced by an underlying topology on the centers («neurons»): Neighbouring neurons «share» their patterns Neighbourhood shrinks as training proceeds
24 The many faces of a Kohonen map: Kohonen map??? Consequences Neurons are positionned in an ordered way on the underlying topology : data visualisation in reduced dimension Clustering of the data around the neurons Dimension reduction and clustering : simplification of exploratory data analysis
25 The many faces of a Kohonen map: some references Juha Vesanto. Som-based data visualization methods. Intelligent Data Analysis, 3(2): , Juha Vesanto and Esa Alhoniemi. Clustering of the self-organizing map. IEEE Transactions on Neural Networks, 11(3): , Juha Vesanto, Johan Himberg, Esa Alhoniemi, and Juha Parhankangas. Som toolbox for matlab 5. Report A57, Helsinki University of Technology, Neural Networks Research Centre, Espoo, Finland, April Vincent Lemaire, Fabrice Clérot. SOM-based-clustering for on-line fraud behaviour classification: a case study, Fuzzy Systems and Knowledge Discovery, Singapore, 2002
26 The many faces of a Kohonen map: map of the individuals Data : X(i, v) i=1 N ind v=1 N var Map of the individuals : W(p, v) p=1 N neurons v=1 N var N neurons << N ind
27 The many faces of a Kohonen map: map of the individuals «Top view» : projection of the individuals Population Clustering Projection of auxiliary data
28 The many faces of a Kohonen map:map of the individuals «Top view» : {N p (v)} p=1 Nneurons prototypes of the map, vectors in N var dimensions : Hard to understand
29 The many faces of a Kohonen map:map of the individuals «Side view» : projection of the variables {M v (p)} v=1 Nvar Projections on the map of the components of the neurons One map for each variable :
30 The many faces of a Kohonen map: map of the individuals «Side view» Each map is representative of the corresponding variable : this allows to study the correlation between variables
31
32
33 Too many maps for a visual inspection : Transform each map into a vector, representative of the variable Build a new Kohonen map : map of the variables
34 The many faces of a Kohonen map:map of the variables Data : projections of the variables Y(v, p) i=1 N var v=1 N neurons Map of the variables : M neurons << N var W(q, p) q=1 M neurons p=1 N neurons Populations Clustering
35 The many faces of a Kohonen map: map of the variables Clustering
36 The many faces of a Kohonen map: map of the variables Back to the map of the individuals: easier interpretation of the clusters of individuals by re-ordering the variables according to their cluster
37 The many faces of a Kohonen map: exploratory data analysis Double clustering : of the individuals of the variables L clusters K clusters Both clusterings are consistent together
38 Overview ADSL customer segmentation: why? how? Technical approach and synopsis Data pre-processing The many faces of a Kohonen map A glance at the results
39 Map of the «typical days»: «classical» activities http, mail, ftp Low activity MS streaming P2P but Kazaa Kazaa http-alt
40 Correlation between IP ports FTP Direct Connect
41 Profiles of typical days Profile Deviation from the mean profile Low activity days Classical applications + FTP days
42 Map of the customers: the big picture
43 «Classical» behaviours :
44 P2P but Kazaa :
45 MS-streaming :
46 Kazaa :
47 «Classical» heavy users :
48 Map of the clients : Classical, light Kazaa MS-streaming Classical, heavy P2P sauf Kazaa
49 5 Peu Actives P2P sauf Kazaa Kazaa 6 Peu Actives Kazaa P2P sauf Kazaa 11 Kazaa P2P sauf Kazaa Classiques 4 Peu Actives P2P sauf Kazaa Kazaa 13 Peu Actives Classiques 3 «Client moyen» 14 MS Streaming Kazaa Classiques 9 MS Streaming P2P sauf Kazaa Classiques 10 P2P sauf Kazaa Classiques Peu Actives 17 Classiques P2P Kazaa Kazaa sauf 1 Classiques Peu Actives 2 P2P sauf Kazaa Peu Actives 12 Kazaa Peu Actives 16 Classiques P2P sauf Kazaa Kazaa 7 Kazaa MS Streaming http-alt Peu Actives 8 http-alt Peu Actives 15 Classiques Peu Actives
50 Correlation with trafic volumes Reasonable fit with a? law : no heavy tails when the volumes are averaged per client? =2.3 : no singularity at the origin all in all, a «nice» distribution Average daily volume Small vs. Large volumes
51 Conclusion Complete analysis, from «atomic» activities to customer segmentation Kohonen maps as a priviledged tool for exploratory data analysis : robust and efficient clustering technique with a visualisation capability which allows to interpret and present the clustering results in a very natural way
52 Conclusion The analysis gives a consistent description of the customer behaviour Nothing really puzzling but turns folklore into figures
53 Conclusion What s next? Investigate the correlation between clusters and trafic (volumes, daily profiles) Investigate the evolution of the clusters in time
A user friendly toolbox for exploratory data analysis of underwater sound
061215-064 1 A user friendly toolbox for exploratory data analysis of underwater sound Fernando J. Pires 1 and Victor Lobo 2, Member, IEEE Abstract The underwater acoustics research group at the Portuguese
More informationUSING SELF-ORGANISING MAPS FOR ANOMALOUS BEHAVIOUR DETECTION IN A COMPUTER FORENSIC INVESTIGATION
USING SELF-ORGANISING MAPS FOR ANOMALOUS BEHAVIOUR DETECTION IN A COMPUTER FORENSIC INVESTIGATION B.K.L. Fei, J.H.P. Eloff, M.S. Olivier, H.M. Tillwick and H.S. Venter Information and Computer Security
More informationData Mining and Neural Networks in Stata
Data Mining and Neural Networks in Stata 2 nd Italian Stata Users Group Meeting Milano, 10 October 2005 Mario Lucchini e Maurizo Pisati Università di Milano-Bicocca mario.lucchini@unimib.it maurizio.pisati@unimib.it
More informationENERGY RESEARCH at the University of Oulu. 1 Introduction Air pollutants such as SO 2
ENERGY RESEARCH at the University of Oulu 129 Use of self-organizing maps in studying ordinary air emission measurements of a power plant Kimmo Leppäkoski* and Laura Lohiniva University of Oulu, Department
More informationA Discussion on Visual Interactive Data Exploration using Self-Organizing Maps
A Discussion on Visual Interactive Data Exploration using Self-Organizing Maps Julia Moehrmann 1, Andre Burkovski 1, Evgeny Baranovskiy 2, Geoffrey-Alexeij Heinze 2, Andrej Rapoport 2, and Gunther Heidemann
More informationNetwork Intrusion Detection Systems
Network Intrusion Detection Systems False Positive Reduction Through Anomaly Detection Joint research by Emmanuele Zambon & Damiano Bolzoni 7/1/06 NIDS - False Positive reduction through Anomaly Detection
More informationVisualization of Breast Cancer Data by SOM Component Planes
International Journal of Science and Technology Volume 3 No. 2, February, 2014 Visualization of Breast Cancer Data by SOM Component Planes P.Venkatesan. 1, M.Mullai 2 1 Department of Statistics,NIRT(Indian
More informationMobile Phone APP Software Browsing Behavior using Clustering Analysis
Proceedings of the 2014 International Conference on Industrial Engineering and Operations Management Bali, Indonesia, January 7 9, 2014 Mobile Phone APP Software Browsing Behavior using Clustering Analysis
More informationA Study of Web Log Analysis Using Clustering Techniques
A Study of Web Log Analysis Using Clustering Techniques Hemanshu Rana 1, Mayank Patel 2 Assistant Professor, Dept of CSE, M.G Institute of Technical Education, Gujarat India 1 Assistant Professor, Dept
More informationData Clustering and Topology Preservation Using 3D Visualization of Self Organizing Maps
, July 4-6, 2012, London, U.K. Data Clustering and Topology Preservation Using 3D Visualization of Self Organizing Maps Z. Mohd Zin, M. Khalid, E. Mesbahi and R. Yusof Abstract The Self Organizing Maps
More informationSymantec Enterprise Firewalls. From the Internet Thomas Jerry Scott
Symantec Enterprise Firewalls From the Internet Thomas Symantec Firewalls Symantec offers a whole line of firewalls The Symantec Enterprise Firewall, which emerged from the older RAPTOR product We are
More informationBandwidth Management for Peer-to-Peer Applications
Overview Bandwidth Management for Peer-to-Peer Applications With the increasing proliferation of broadband, more and more users are using Peer-to-Peer (P2P) protocols to share very large files, including
More informationLocal Anomaly Detection for Network System Log Monitoring
Local Anomaly Detection for Network System Log Monitoring Pekka Kumpulainen Kimmo Hätönen Tampere University of Technology Nokia Siemens Networks pekka.kumpulainen@tut.fi kimmo.hatonen@nsn.com Abstract
More informationLehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall
Chapter 2: Security Techniques Background Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application Layer Chapter 5: Security Concepts for Networks Firewalls Intrusion Detection
More informationUsing Data Mining for Mobile Communication Clustering and Characterization
Using Data Mining for Mobile Communication Clustering and Characterization A. Bascacov *, C. Cernazanu ** and M. Marcu ** * Lasting Software, Timisoara, Romania ** Politehnica University of Timisoara/Computer
More information2002 IEEE. Reprinted with permission.
Laiho J., Kylväjä M. and Höglund A., 2002, Utilization of Advanced Analysis Methods in UMTS Networks, Proceedings of the 55th IEEE Vehicular Technology Conference ( Spring), vol. 2, pp. 726-730. 2002 IEEE.
More informationInternational Journal of Computer Science and Applications Vol. 6, No. 3, pp 20 32, 2009
International Journal of Computer Science and Applications Vol. 6, No. 3, pp 20 32, 2009 Technomathematics Research Foundation ATTACK CLASSIFICATION BASED ON DATA MINING TECHNIQUE AND ITS APPLICATION FOR
More informationUsing Smoothed Data Histograms for Cluster Visualization in Self-Organizing Maps
Technical Report OeFAI-TR-2002-29, extended version published in Proceedings of the International Conference on Artificial Neural Networks, Springer Lecture Notes in Computer Science, Madrid, Spain, 2002.
More informationOn the use of Three-dimensional Self-Organizing Maps for Visualizing Clusters in Geo-referenced Data
On the use of Three-dimensional Self-Organizing Maps for Visualizing Clusters in Geo-referenced Data Jorge M. L. Gorricha and Victor J. A. S. Lobo CINAV-Naval Research Center, Portuguese Naval Academy,
More informationInformation Visualization with Self-Organizing Maps
Information Visualization with Self-Organizing Maps Jing Li Abstract: The Self-Organizing Map (SOM) is an unsupervised neural network algorithm that projects highdimensional data onto a two-dimensional
More informationA Review of Data Clustering Approaches
A Review of Data Clustering Approaches Vaishali Aggarwal, Anil Kumar Ahlawat, B.N Panday Abstract- Fast retrieval of the relevant information from the databases has always been a significant issue. Different
More informationWeb Usage Mining: Identification of Trends Followed by the user through Neural Network
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 7 (2013), pp. 617-624 International Research Publications House http://www. irphouse.com /ijict.htm Web
More informationCisco Network Analysis Module Software 4.0
Cisco Network Analysis Module Software 4.0 Overview Presentation Improve Operational Efficiency with Increased Network and Application Visibility 1 Enhancing Operational Manageability Optimize Application
More informationTransforming the Telecoms Business using Big Data and Analytics
Transforming the Telecoms Business using Big Data and Analytics Event: ICT Forum for HR Professionals Venue: Meikles Hotel, Harare, Zimbabwe Date: 19 th 21 st August 2015 AFRALTI 1 Objectives Describe
More informationAttack and Defense Techniques
Network Security Attack and Defense Techniques Anna Sperotto, Ramin Sadre Design and Analysis of Communication Networks (DACS) University of Twente The Netherlands Attack Taxonomy Many different kind of
More informationANALYSIS OF MOBILE RADIO ACCESS NETWORK USING THE SELF-ORGANIZING MAP
ANALYSIS OF MOBILE RADIO ACCESS NETWORK USING THE SELF-ORGANIZING MAP Kimmo Raivio, Olli Simula, Jaana Laiho and Pasi Lehtimäki Helsinki University of Technology Laboratory of Computer and Information
More informationThe Picture must be Clear. IPTV Quality of Experience
The Picture must be Clear IPTV Quality of Experience 1 Video-over-IP vs IPTV? Video-over-IP A technology for moving video from A to B How about: Video-over-wire? Video-over-UHF? Video-over-Satellite? Can
More informationA Partially Supervised Metric Multidimensional Scaling Algorithm for Textual Data Visualization
A Partially Supervised Metric Multidimensional Scaling Algorithm for Textual Data Visualization Ángela Blanco Universidad Pontificia de Salamanca ablancogo@upsa.es Spain Manuel Martín-Merino Universidad
More informationWorkplace Accidents Analysis with a Coupled Clustering Methods: S.O.M. and K-means Algorithms
A publication of CHEMICAL ENGINEERING TRANSACTIONS VOL. 43, 2015 Chief Editors: Sauro Pierucci, Jiří J. Klemeš Copyright 2015, AIDIC Servizi S.r.l., ISBN 978-88-95608-34-1; ISSN 2283-9216 The Italian Association
More informationHow To Understand A Network Attack
Network Security Attack and Defense Techniques Anna Sperotto (with material from Ramin Sadre) Design and Analysis of Communication Networks (DACS) University of Twente The Netherlands Attacks! Many different
More informationMonitoring of Complex Industrial Processes based on Self-Organizing Maps and Watershed Transformations
Monitoring of Complex Industrial Processes based on Self-Organizing Maps and Watershed Transformations Christian W. Frey 2012 Monitoring of Complex Industrial Processes based on Self-Organizing Maps and
More informationCredit Card Fraud Detection Using Self Organised Map
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 13 (2014), pp. 1343-1348 International Research Publications House http://www. irphouse.com Credit Card Fraud
More informationUNIVERSITY OF BOLTON SCHOOL OF ENGINEERING MS SYSTEMS ENGINEERING AND ENGINEERING MANAGEMENT SEMESTER 1 EXAMINATION 2015/2016 INTELLIGENT SYSTEMS
TW72 UNIVERSITY OF BOLTON SCHOOL OF ENGINEERING MS SYSTEMS ENGINEERING AND ENGINEERING MANAGEMENT SEMESTER 1 EXAMINATION 2015/2016 INTELLIGENT SYSTEMS MODULE NO: EEM7010 Date: Monday 11 th January 2016
More informationVisualising Class Distribution on Self-Organising Maps
Visualising Class Distribution on Self-Organising Maps Rudolf Mayer, Taha Abdel Aziz, and Andreas Rauber Institute for Software Technology and Interactive Systems Vienna University of Technology Favoritenstrasse
More informationThey can be obtained in HQJHQH format directly from the home page at: http://www.engene.cnb.uam.es/downloads/kobayashi.dat
HQJHQH70 *XLGHG7RXU This document contains a Guided Tour through the HQJHQH platform and it was created for training purposes with respect to the system options and analysis possibilities. It is not intended
More informationData Mining. 1 Introduction 2 Data Mining methods. Alfred Holl Data Mining 1
Data Mining 1 Introduction 2 Data Mining methods Alfred Holl Data Mining 1 1 Introduction 1.1 Motivation 1.2 Goals and problems 1.3 Definitions 1.4 Roots 1.5 Data Mining process 1.6 Epistemological constraints
More informationUsing reporting and data mining techniques to improve knowledge of subscribers; applications to customer profiling and fraud management
Using reporting and data mining techniques to improve knowledge of subscribers; applications to customer profiling and fraud management Paper Jean-Louis Amat Abstract One of the main issues of operators
More informationFuel Cell Health Monitoring Using Self Organizing Maps
A publication of CHEMICAL ENGINEERINGTRANSACTIONS VOL. 33, 2013 Guest Editors: Enrico Zio, Piero Baraldi Copyright 2013, AIDIC ServiziS.r.l., ISBN 978-88-95608-24-2; ISSN 1974-9791 The Italian Association
More informationMANAGING QUEUE STABILITY USING ART2 IN ACTIVE QUEUE MANAGEMENT FOR CONGESTION CONTROL
MANAGING QUEUE STABILITY USING ART2 IN ACTIVE QUEUE MANAGEMENT FOR CONGESTION CONTROL G. Maria Priscilla 1 and C. P. Sumathi 2 1 S.N.R. Sons College (Autonomous), Coimbatore, India 2 SDNB Vaishnav College
More informationDigital Subscriber Line (DSL)
CHAPTER 9 This chapter describes the level of support that Cisco ANA provides for DSL, as follows: Technology Description, page 9-1 Inventory and Information Model Objects (IMOs), page 9-2 Vendor-Specific
More informationA Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
More informationExtreme Networks CoreFlow2 Technology TECHNOLOGY STRATEGY BRIEF
Extreme Networks CoreFlow2 Technology TECHNOLOGY STRATEGY BRIEF TECHNOLOGY STRATEGY BRIEF Extreme Networks CoreFlow2 Technology Benefits INCREASED VISIBILITY Detailed monitoring of applications, their
More informationGrid Density Clustering Algorithm
Grid Density Clustering Algorithm Amandeep Kaur Mann 1, Navneet Kaur 2, Scholar, M.Tech (CSE), RIMT, Mandi Gobindgarh, Punjab, India 1 Assistant Professor (CSE), RIMT, Mandi Gobindgarh, Punjab, India 2
More informationData Mining Analysis of a Complex Multistage Polymer Process
Data Mining Analysis of a Complex Multistage Polymer Process Rolf Burghaus, Daniel Leineweber, Jörg Lippert 1 Problem Statement Especially in the highly competitive commodities market, the chemical process
More informationCustomer Data Mining and Visualization by Generative Topographic Mapping Methods
Customer Data Mining and Visualization by Generative Topographic Mapping Methods Jinsan Yang and Byoung-Tak Zhang Artificial Intelligence Lab (SCAI) School of Computer Science and Engineering Seoul National
More informationHow Organisations Are Using Data Mining Techniques To Gain a Competitive Advantage John Spooner SAS UK
How Organisations Are Using Data Mining Techniques To Gain a Competitive Advantage John Spooner SAS UK Agenda Analytics why now? The process around data and text mining Case Studies The Value of Information
More informationData Mining using Rule Extraction from Kohonen Self-Organising Maps
Data Mining using Rule Extraction from Kohonen Self-Organising Maps James Malone, Kenneth McGarry, Stefan Wermter and Chris Bowerman School of Computing and Technology, University of Sunderland, St Peters
More informationCLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA
CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA Professor Yang Xiang Network Security and Computing Laboratory (NSCLab) School of Information Technology Deakin University, Melbourne, Australia http://anss.org.au/nsclab
More informationINTERNET TRAFFIC CLUSTERING USING PACKET HEADER INFORMATION
INTERNET TRAFFIC CLUSTERING USING PACKET HEADER INFORMATION Pekka Kumpulainen 1, Kimmo Hätönen 2, Olli Knuuti 3 and Teemu Alapaholuoma 1 1 Pori Unit, Tampere University of Technology, Pori, Finland 2 CTO
More informationIntroducing IBM s Advanced Threat Protection Platform
Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Extensible Approach to Threat Prevention Paul Kaspian Senior Product Marketing Manager IBM Security Systems 1 IBM NDA 2012 Only IBM
More informationP2P Traffic Manager. L7 Internet Security. IP Appliance Products
IP Appliance Products P2P Traffic Manager L7 Internet Security Headquarter 13 Fl., Eunsung Bldg., 53-8 Cheongdamdong Kangnamgu Seoul, Korea 135-763 Tel +822-3446-6070 Fax +822-3445-9099 R&D Center 34 Gajeongdong,
More informationIntroduction. A. Bellaachia Page: 1
Introduction 1. Objectives... 3 2. What is Data Mining?... 4 3. Knowledge Discovery Process... 5 4. KD Process Example... 7 5. Typical Data Mining Architecture... 8 6. Database vs. Data Mining... 9 7.
More informationEfficiently Managing Firewall Conflicting Policies
Efficiently Managing Firewall Conflicting Policies 1 K.Raghavendra swamy, 2 B.Prashant 1 Final M Tech Student, 2 Associate professor, Dept of Computer Science and Engineering 12, Eluru College of Engineeering
More informationIP Network Monitoring and Measurements: Techniques and Experiences
IP Network Monitoring and Measurements: Techniques and Experiences Philippe Owezarski LAAS-CNRS Toulouse, France Owe@laas.fr 1 Outline 4 Introduction 4 Monitoring problematic 8Only based on network administration
More informationIntroduction to Meg@POP
Introduction to Meg@POP SingTel Meg@POP is a comprehensive suite of IP services for businesses which need a secured connection to multiple locations, parties or services in Singapore. It provides a simple
More informationThe KDD Process: Applying Data Mining
The KDD Process: Applying Nuno Cavalheiro Marques (nmm@di.fct.unl.pt) Spring Semester 2010/2011 MSc in Computer Science Outline I 1 Knowledge Discovery in Data beyond the Computer 2 by Visualization Lift
More informationIdentifying the Number of Visitors to improve Website Usability from Educational Institution Web Log Data
Identifying the Number of to improve Website Usability from Educational Institution Web Log Data Arvind K. Sharma Dept. of CSE Jaipur National University, Jaipur, Rajasthan,India P.C. Gupta Dept. of CSI
More informationClustering of the Self-Organizing Map
586 IEEE TRANSACTIONS ON NEURAL NETWORKS, VOL. 11, NO. 3, MAY 2000 Clustering of the Self-Organizing Map Juha Vesanto and Esa Alhoniemi, Student Member, IEEE Abstract The self-organizing map (SOM) is an
More informationExpanding Self-organizing Map for Data. Visualization and Cluster Analysis
Expanding Self-organizing Map for Data Visualization and Cluster Analysis Huidong Jin a,b, Wing-Ho Shum a, Kwong-Sak Leung a, Man-Leung Wong c a Department of Computer Science and Engineering, The Chinese
More informationData Mining for Customer Service Support. Senioritis Seminar Presentation Megan Boice Jay Carter Nick Linke KC Tobin
Data Mining for Customer Service Support Senioritis Seminar Presentation Megan Boice Jay Carter Nick Linke KC Tobin Traditional Hotline Services Problem Traditional Customer Service Support (manufacturing)
More informationAudiovisual Services over ADSL
Audiovisual Services over ADSL November 17, 2004 Pierre Quentel FT/R&D Division Laboratory "Distribution and Protection of Contents" Le présent document contient des inf ormations qui sont la propriété
More informationPredict Influencers in the Social Network
Predict Influencers in the Social Network Ruishan Liu, Yang Zhao and Liuyu Zhou Email: rliu2, yzhao2, lyzhou@stanford.edu Department of Electrical Engineering, Stanford University Abstract Given two persons
More informationHunting for the Undefined Threat: Advanced Analytics & Visualization
SESSION ID: ANF-W04 Hunting for the Undefined Threat: Advanced Analytics & Visualization Joshua Stevens Enterprise Security Architect Hewlett-Packard Cyber Security Technology Office Defining the Hunt
More informationPRACTICAL DATA MINING IN A LARGE UTILITY COMPANY
QÜESTIIÓ, vol. 25, 3, p. 509-520, 2001 PRACTICAL DATA MINING IN A LARGE UTILITY COMPANY GEORGES HÉBRAIL We present in this paper the main applications of data mining techniques at Electricité de France,
More informationHow To Monitor And Test An Ethernet Network On A Computer Or Network Card
3. MONITORING AND TESTING THE ETHERNET NETWORK 3.1 Introduction The following parameters are covered by the Ethernet performance metrics: Latency (delay) the amount of time required for a frame to travel
More informationNetwork Monitoring and Traffic CSTNET, CNIC
Network Monitoring and Traffic Analysis in CSTNET Chunjing Han Aug. 2013 CSTNET, CNIC Topics 1. The background of network monitoring 2. Network monitoring protocols and related tools 3. Network monitoring
More informationNETWORK-BASED INTRUSION DETECTION USING NEURAL NETWORKS
1 NETWORK-BASED INTRUSION DETECTION USING NEURAL NETWORKS ALAN BIVENS biven@cs.rpi.edu RASHEDA SMITH smithr2@cs.rpi.edu CHANDRIKA PALAGIRI palgac@cs.rpi.edu BOLESLAW SZYMANSKI szymansk@cs.rpi.edu MARK
More informationTCP/IP Basis. OSI Model
TCP/IP Basis 高 雄 大 學 資 訊 工 程 學 系 嚴 力 行 Source OSI Model Destination Application Presentation Session Transport Network Data-Link Physical ENCAPSULATION DATA SEGMENT PACKET FRAME BITS 0101010101010101010
More informationThe Dependence of Internet User Traffic Characteristics on Access Speed
University of Würzburg Institute of Computer Science Research Report Series The Dependence of Internet User Traffic Characteristics on Access Speed Norbert Vicari*, Stefan Köhler* and Joachim Charzinski
More informationSecure Networks for Process Control
Secure Networks for Process Control Leveraging a Simple Yet Effective Policy Framework to Secure the Modern Process Control Network An Enterasys Networks White Paper There is nothing more important than
More informationVISUALIZATION OF GEOSPATIAL DATA BY COMPONENT PLANES AND U-MATRIX
VISUALIZATION OF GEOSPATIAL DATA BY COMPONENT PLANES AND U-MATRIX Marcos Aurélio Santos da Silva 1, Antônio Miguel Vieira Monteiro 2 and José Simeão Medeiros 2 1 Embrapa Tabuleiros Costeiros - Laboratory
More informationImproving Network Efficiency for SMB Through Intelligent Load Balancing
Improving Network Efficiency for SMB Through Intelligent Load Balancing White Paper Series WP100134 Mike Mo, VP of Engineering January 2005 Abstract: As reliable Internet connectivity becomes a daily business
More informationStochastic Protocol Modeling for Anomaly-Based Network Intrusion Detection
2003 IEEE International Workshop on Information Assurance March 24th, 2003 Darmstadt, Germany Stochastic Protocol Modeling for Anomaly-Based Network Intrusion Detection Juan M. Estévez-Tapiador (tapiador@ugr.es)
More informationData topology visualization for the Self-Organizing Map
Data topology visualization for the Self-Organizing Map Kadim Taşdemir and Erzsébet Merényi Rice University - Electrical & Computer Engineering 6100 Main Street, Houston, TX, 77005 - USA Abstract. The
More informationEfficient Security Alert Management System
Efficient Security Alert Management System Minoo Deljavan Anvary IT Department School of e-learning Shiraz University Shiraz, Fars, Iran Majid Ghonji Feshki Department of Computer Science Qzvin Branch,
More informationThe Research of Data Mining Based on Neural Networks
2011 International Conference on Computer Science and Information Technology (ICCSIT 2011) IPCSIT vol. 51 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V51.09 The Research of Data Mining
More informationNetwork Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion
Network Security Tampere Seminar 23rd October 2008 1 Copyright 2008 Hirschmann 2008 Hirschmann Automation and and Control GmbH. Contents Overview Switch Security Firewalls Conclusion 2 Copyright 2008 Hirschmann
More informationCover. White Paper. (nchronos 4.1)
Cover White Paper (nchronos 4.1) Copyright Copyright 2013 Colasoft LLC. All rights reserved. Information in this document is subject to change without notice. No part of this document may be reproduced
More informationDATA MINING TECHNOLOGY. Keywords: data mining, data warehouse, knowledge discovery, OLAP, OLAM.
DATA MINING TECHNOLOGY Georgiana Marin 1 Abstract In terms of data processing, classical statistical models are restrictive; it requires hypotheses, the knowledge and experience of specialists, equations,
More informationQuick Guide of HiDDNS Settings (with UPnP)
Quick Guide of HiDDNS Settings (with UPnP) Solution 1: With the development of surveillance systems, more and more users want to use ADSL to realize video surveillance through network. But ADSL gives dynamic
More informationUnderstanding Web personalization with Web Usage Mining and its Application: Recommender System
Understanding Web personalization with Web Usage Mining and its Application: Recommender System Manoj Swami 1, Prof. Manasi Kulkarni 2 1 M.Tech (Computer-NIMS), VJTI, Mumbai. 2 Department of Computer Technology,
More informationData Mining for Fun and Profit
Data Mining for Fun and Profit Data mining is the extraction of implicit, previously unknown, and potentially useful information from data. - Ian H. Witten, Data Mining: Practical Machine Learning Tools
More informationTopological Tree Clustering of Social Network Search Results
Topological Tree Clustering of Social Network Search Results Richard T. Freeman Capgemini, FS Business Information Management No. 1 Forge End, Woking, Surrey, GU21 6DB United Kingdom richard.freeman@capgemini.com
More informationCITY UNIVERSITY OF HONG KONG 香 港 城 市 大 學. Self-Organizing Map: Visualization and Data Handling 自 組 織 神 經 網 絡 : 可 視 化 和 數 據 處 理
CITY UNIVERSITY OF HONG KONG 香 港 城 市 大 學 Self-Organizing Map: Visualization and Data Handling 自 組 織 神 經 網 絡 : 可 視 化 和 數 據 處 理 Submitted to Department of Electronic Engineering 電 子 工 程 學 系 in Partial Fulfillment
More informationA Study of Web Traffic Analysis
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IJCSMC, Vol. 3, Issue.
More informationModelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches
Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches PhD Thesis by Payam Birjandi Director: Prof. Mihai Datcu Problematic
More informationIntelligent Network Monitoring for Your LAN, WAN and ATM Network
Intelligent Network Monitoring for Your LAN, WAN and ATM Network Solutions ZettaE2E Intelligent Network Monitoring for Your LAN, WAN and ATM Network Key Benefits Reduce current and future LAN, WAN and
More informationIntrusion Detection. Jeffrey J.P. Tsai. Imperial College Press. A Machine Learning Approach. Zhenwei Yu. University of Illinois, Chicago, USA
SERIES IN ELECTRICAL AND COMPUTER ENGINEERING Intrusion Detection A Machine Learning Approach Zhenwei Yu University of Illinois, Chicago, USA Jeffrey J.P. Tsai Asia University, University of Illinois,
More informationCommunications and Computer Networks
SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the
More informationEFFICIENT DATA PRE-PROCESSING FOR DATA MINING
EFFICIENT DATA PRE-PROCESSING FOR DATA MINING USING NEURAL NETWORKS JothiKumar.R 1, Sivabalan.R.V 2 1 Research scholar, Noorul Islam University, Nagercoil, India Assistant Professor, Adhiparasakthi College
More informationHow to use Big Data in Industry 4.0 implementations. LAURI ILISON, PhD Head of Big Data and Machine Learning
How to use Big Data in Industry 4.0 implementations LAURI ILISON, PhD Head of Big Data and Machine Learning Big Data definition? Big Data is about structured vs unstructured data Big Data is about Volume
More informationHow To Use Neural Networks In Data Mining
International Journal of Electronics and Computer Science Engineering 1449 Available Online at www.ijecse.org ISSN- 2277-1956 Neural Networks in Data Mining Priyanka Gaur Department of Information and
More informationLoad Balance Mechanism
Load Balance Application in Dual-WAN Interface Load Balance Mechanism To which WAN port the traffic will be routed is determined according to the Load Balance mechanism. Below diagram shows how Vigor router
More informationNeural Network Add-in
Neural Network Add-in Version 1.5 Software User s Guide Contents Overview... 2 Getting Started... 2 Working with Datasets... 2 Open a Dataset... 3 Save a Dataset... 3 Data Pre-processing... 3 Lagging...
More informationData Mining Solutions for the Business Environment
Database Systems Journal vol. IV, no. 4/2013 21 Data Mining Solutions for the Business Environment Ruxandra PETRE University of Economic Studies, Bucharest, Romania ruxandra_stefania.petre@yahoo.com Over
More informationProceedings - AutoCarto 2012 - Columbus, Ohio, USA - September 16-18, 2012
Data Mining of Collaboratively Collected Geographic Crime Information Using an Unsupervised Neural Network Approach Julian Hagenauer, Marco Helbich (corresponding author), Michael Leitner, Jerry Ratcliffe,
More informationUSING SELF-ORGANIZING MAPS FOR INFORMATION VISUALIZATION AND KNOWLEDGE DISCOVERY IN COMPLEX GEOSPATIAL DATASETS
USING SELF-ORGANIZING MAPS FOR INFORMATION VISUALIZATION AND KNOWLEDGE DISCOVERY IN COMPLEX GEOSPATIAL DATASETS Koua, E.L. International Institute for Geo-Information Science and Earth Observation (ITC).
More informationFrom Network Security To Content Filtering
Computer Fraud & Security, May 2007 page 1/10 From Network Security To Content Filtering Network security has evolved dramatically in the last few years not only for what concerns the tools at our disposals
More informationDotted Chart and Control-Flow Analysis for a Loan Application Process
Dotted Chart and Control-Flow Analysis for a Loan Application Process Thomas Molka 1,2, Wasif Gilani 1 and Xiao-Jun Zeng 2 Business Intelligence Practice, SAP Research, Belfast, UK The University of Manchester,
More informationProtocols. Packets. What's in an IP packet
Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets
More information