From IP port numbers to ADSL customer segmentation

Size: px
Start display at page:

Download "From IP port numbers to ADSL customer segmentation"

Transcription

1 From IP port numbers to ADSL customer segmentation F. Clérot France Télécom R&D

2 Overview ADSL customer segmentation: why? how? Technical approach and synopsis Data pre-processing The many faces of a Kohonen map A glance at the results

3 Overview ADSL customer segmentation: why? how? Technical approach and synopsis Data pre-processing The many faces of a Kohonen map A glance at the results

4 ADSL customer segmentation PURPOSE Fine-grain understanding of the customer behaviour Anticipate (at least detect) changes in behaviour patterns

5 ADSL customer segmentation WHY? Rapidly expanding market Strong competition Fast adoption of new applications (P2P, streaming) by some segments

6 ADSL customer segmentation HOW? Bandwidth? Rather easy Big users vs. small users classification Usefull for network dimensionning Limited use for market understanding

7 ADSL customer segmentation HOW? Usage? More difficult: define what a «usage» is If successfull, will lead to a better understanding of the market If successfull, may also be usefull for network dimensionning: usage determines bandwidth

8 ADSL customer segmentation DATA?

9 Capture : BAS IP backbone sonde Office DSLAM Observation point: ATM on STM1 Telephone LAN ATU-R Filter DSLAM ATM Telephone Filter ATU-R Home

10 Data : IP and TCP relevant header fields For our purposes : VP/VC (customer Id) Time granularity, 6 minute periods Volumes (upstream and downstream) per IP port About 800 customers, one month of data

11 Overview ADSL customer segmentation: why? how? Technical approach and synopsis Data pre-processing The many faces of a Kohonen map A glance at the results

12 Technical approach Segmentation of ADSL clients based on their activities: clustering with Kohonen maps Use minimum a priori knowledge Timescale: activity defined on a daily basis Representation: retain only the ports having the greatest volumes

13 Synopsis of the analysis Data pre-processing Volumes are too correlated to applications to be informative: order statistics Three steps for a double clustering First, cluster the «atomic» activities to define what the «typical activities» are Second, project customers on such «typical activities» Third, cluster the customers

14 Discover Typical Activities : LOG FILE Client1 Day1 RankVol11 Client1 Day2 RankVol12 Client2 Day1 RankVol21 Client2 Day3 RankVol23 Client2 Day5 RankVol25 Client3 Day2 RankVol32 Client4 Day4 RankVol44 Client4 Day5 RankVol45 Client5 Day6 RankVol56... Typical Day 2 RankVolume Space Typical Day 3 Clustering of the Days In the RankVolume space + Clustering of the IP ports Typical Day 1 Typical Day 4

15 Project customers on typical LOG FILE activities : Client1 Day1 RankVol11 Client1 Day2 RankVol12 Client2 Day1 RankVol21 Client2 Day3 RankVol23 Client2 Day5 RankVol25 Client3 Day2 RankVol32 Client4 Day4 RankVol44 Client4 Day5 RankVol45 Client5 Day6 RankVol56... Typical Day 2 RankVolume Space Typical Day 3... Client2 (1, 1, 0, 1)... Project the customers on the «typical days»: Customer Profiles Typical Day 1 Typical Day 4

16 Discover Typical Customers : Client1 CustomerProfile1 Client2 CustomerProfile2 Client3 CustomerProfile3 Typical Days Space Clustering of the Customers in the Typical Days Space

17 Overview ADSL customer segmentation: why? how? Technical approach and synopsis Data pre-processing The many faces of a Kohonen map A glance at the results

18 Data pre-processing : Raw volumes hide the relevant information: Typical volumes used by applications span many orders of magnitude : a big user will very likely consume less volume thana small P2P user! Simple-minded normalisation does not help much : Heavy-tailed distributions

19 Example of distribution

20 Data pre-processing : Use rank statistics to represent each day : Sort the volumes according to all the volumes for the same port in the log file Use the rank as a representation for the day on this port

21 Data pre-processing : Raw Volumes ClientId TimeStamp E- mail P2P Client 1 Day Client 1 Day Client 2 Day Client 2 Day Client 2 Day Client 3 Day Client 3 Day Client 4 Day Client 4 Day3 2 0 Client 4 Day Rank Volumes ClientId TimeStamp E- mail P2P Client 1 Day1 7 2 Client 1 Day2 9 6 Client 2 Day1 2 6 Client 2 Day2 7 1 Client 2 Day4 2 6 Client 3 Day3 1 4 Client 3 Day4 2 9 Client 4 Day2 9 3 Client 4 Day3 6 9 Client 4 Day4 5 4

22 Overview ADSL customer segmentation: why? how? Technical approach and synopsis Data pre-processing The many faces of a Kohonen map A glance at the results

23 The many faces of a Kohonen map: Kohonen map??? «Collaborative» K-means Collaboration is enforced by an underlying topology on the centers («neurons»): Neighbouring neurons «share» their patterns Neighbourhood shrinks as training proceeds

24 The many faces of a Kohonen map: Kohonen map??? Consequences Neurons are positionned in an ordered way on the underlying topology : data visualisation in reduced dimension Clustering of the data around the neurons Dimension reduction and clustering : simplification of exploratory data analysis

25 The many faces of a Kohonen map: some references Juha Vesanto. Som-based data visualization methods. Intelligent Data Analysis, 3(2): , Juha Vesanto and Esa Alhoniemi. Clustering of the self-organizing map. IEEE Transactions on Neural Networks, 11(3): , Juha Vesanto, Johan Himberg, Esa Alhoniemi, and Juha Parhankangas. Som toolbox for matlab 5. Report A57, Helsinki University of Technology, Neural Networks Research Centre, Espoo, Finland, April Vincent Lemaire, Fabrice Clérot. SOM-based-clustering for on-line fraud behaviour classification: a case study, Fuzzy Systems and Knowledge Discovery, Singapore, 2002

26 The many faces of a Kohonen map: map of the individuals Data : X(i, v) i=1 N ind v=1 N var Map of the individuals : W(p, v) p=1 N neurons v=1 N var N neurons << N ind

27 The many faces of a Kohonen map: map of the individuals «Top view» : projection of the individuals Population Clustering Projection of auxiliary data

28 The many faces of a Kohonen map:map of the individuals «Top view» : {N p (v)} p=1 Nneurons prototypes of the map, vectors in N var dimensions : Hard to understand

29 The many faces of a Kohonen map:map of the individuals «Side view» : projection of the variables {M v (p)} v=1 Nvar Projections on the map of the components of the neurons One map for each variable :

30 The many faces of a Kohonen map: map of the individuals «Side view» Each map is representative of the corresponding variable : this allows to study the correlation between variables

31

32

33 Too many maps for a visual inspection : Transform each map into a vector, representative of the variable Build a new Kohonen map : map of the variables

34 The many faces of a Kohonen map:map of the variables Data : projections of the variables Y(v, p) i=1 N var v=1 N neurons Map of the variables : M neurons << N var W(q, p) q=1 M neurons p=1 N neurons Populations Clustering

35 The many faces of a Kohonen map: map of the variables Clustering

36 The many faces of a Kohonen map: map of the variables Back to the map of the individuals: easier interpretation of the clusters of individuals by re-ordering the variables according to their cluster

37 The many faces of a Kohonen map: exploratory data analysis Double clustering : of the individuals of the variables L clusters K clusters Both clusterings are consistent together

38 Overview ADSL customer segmentation: why? how? Technical approach and synopsis Data pre-processing The many faces of a Kohonen map A glance at the results

39 Map of the «typical days»: «classical» activities http, mail, ftp Low activity MS streaming P2P but Kazaa Kazaa http-alt

40 Correlation between IP ports FTP Direct Connect

41 Profiles of typical days Profile Deviation from the mean profile Low activity days Classical applications + FTP days

42 Map of the customers: the big picture

43 «Classical» behaviours :

44 P2P but Kazaa :

45 MS-streaming :

46 Kazaa :

47 «Classical» heavy users :

48 Map of the clients : Classical, light Kazaa MS-streaming Classical, heavy P2P sauf Kazaa

49 5 Peu Actives P2P sauf Kazaa Kazaa 6 Peu Actives Kazaa P2P sauf Kazaa 11 Kazaa P2P sauf Kazaa Classiques 4 Peu Actives P2P sauf Kazaa Kazaa 13 Peu Actives Classiques 3 «Client moyen» 14 MS Streaming Kazaa Classiques 9 MS Streaming P2P sauf Kazaa Classiques 10 P2P sauf Kazaa Classiques Peu Actives 17 Classiques P2P Kazaa Kazaa sauf 1 Classiques Peu Actives 2 P2P sauf Kazaa Peu Actives 12 Kazaa Peu Actives 16 Classiques P2P sauf Kazaa Kazaa 7 Kazaa MS Streaming http-alt Peu Actives 8 http-alt Peu Actives 15 Classiques Peu Actives

50 Correlation with trafic volumes Reasonable fit with a? law : no heavy tails when the volumes are averaged per client? =2.3 : no singularity at the origin all in all, a «nice» distribution Average daily volume Small vs. Large volumes

51 Conclusion Complete analysis, from «atomic» activities to customer segmentation Kohonen maps as a priviledged tool for exploratory data analysis : robust and efficient clustering technique with a visualisation capability which allows to interpret and present the clustering results in a very natural way

52 Conclusion The analysis gives a consistent description of the customer behaviour Nothing really puzzling but turns folklore into figures

53 Conclusion What s next? Investigate the correlation between clusters and trafic (volumes, daily profiles) Investigate the evolution of the clusters in time

A user friendly toolbox for exploratory data analysis of underwater sound

A user friendly toolbox for exploratory data analysis of underwater sound 061215-064 1 A user friendly toolbox for exploratory data analysis of underwater sound Fernando J. Pires 1 and Victor Lobo 2, Member, IEEE Abstract The underwater acoustics research group at the Portuguese

More information

USING SELF-ORGANISING MAPS FOR ANOMALOUS BEHAVIOUR DETECTION IN A COMPUTER FORENSIC INVESTIGATION

USING SELF-ORGANISING MAPS FOR ANOMALOUS BEHAVIOUR DETECTION IN A COMPUTER FORENSIC INVESTIGATION USING SELF-ORGANISING MAPS FOR ANOMALOUS BEHAVIOUR DETECTION IN A COMPUTER FORENSIC INVESTIGATION B.K.L. Fei, J.H.P. Eloff, M.S. Olivier, H.M. Tillwick and H.S. Venter Information and Computer Security

More information

Data Mining and Neural Networks in Stata

Data Mining and Neural Networks in Stata Data Mining and Neural Networks in Stata 2 nd Italian Stata Users Group Meeting Milano, 10 October 2005 Mario Lucchini e Maurizo Pisati Università di Milano-Bicocca mario.lucchini@unimib.it maurizio.pisati@unimib.it

More information

ENERGY RESEARCH at the University of Oulu. 1 Introduction Air pollutants such as SO 2

ENERGY RESEARCH at the University of Oulu. 1 Introduction Air pollutants such as SO 2 ENERGY RESEARCH at the University of Oulu 129 Use of self-organizing maps in studying ordinary air emission measurements of a power plant Kimmo Leppäkoski* and Laura Lohiniva University of Oulu, Department

More information

A Discussion on Visual Interactive Data Exploration using Self-Organizing Maps

A Discussion on Visual Interactive Data Exploration using Self-Organizing Maps A Discussion on Visual Interactive Data Exploration using Self-Organizing Maps Julia Moehrmann 1, Andre Burkovski 1, Evgeny Baranovskiy 2, Geoffrey-Alexeij Heinze 2, Andrej Rapoport 2, and Gunther Heidemann

More information

Network Intrusion Detection Systems

Network Intrusion Detection Systems Network Intrusion Detection Systems False Positive Reduction Through Anomaly Detection Joint research by Emmanuele Zambon & Damiano Bolzoni 7/1/06 NIDS - False Positive reduction through Anomaly Detection

More information

Visualization of Breast Cancer Data by SOM Component Planes

Visualization of Breast Cancer Data by SOM Component Planes International Journal of Science and Technology Volume 3 No. 2, February, 2014 Visualization of Breast Cancer Data by SOM Component Planes P.Venkatesan. 1, M.Mullai 2 1 Department of Statistics,NIRT(Indian

More information

Mobile Phone APP Software Browsing Behavior using Clustering Analysis

Mobile Phone APP Software Browsing Behavior using Clustering Analysis Proceedings of the 2014 International Conference on Industrial Engineering and Operations Management Bali, Indonesia, January 7 9, 2014 Mobile Phone APP Software Browsing Behavior using Clustering Analysis

More information

A Study of Web Log Analysis Using Clustering Techniques

A Study of Web Log Analysis Using Clustering Techniques A Study of Web Log Analysis Using Clustering Techniques Hemanshu Rana 1, Mayank Patel 2 Assistant Professor, Dept of CSE, M.G Institute of Technical Education, Gujarat India 1 Assistant Professor, Dept

More information

Data Clustering and Topology Preservation Using 3D Visualization of Self Organizing Maps

Data Clustering and Topology Preservation Using 3D Visualization of Self Organizing Maps , July 4-6, 2012, London, U.K. Data Clustering and Topology Preservation Using 3D Visualization of Self Organizing Maps Z. Mohd Zin, M. Khalid, E. Mesbahi and R. Yusof Abstract The Self Organizing Maps

More information

Symantec Enterprise Firewalls. From the Internet Thomas Jerry Scott

Symantec Enterprise Firewalls. From the Internet Thomas Jerry Scott Symantec Enterprise Firewalls From the Internet Thomas Symantec Firewalls Symantec offers a whole line of firewalls The Symantec Enterprise Firewall, which emerged from the older RAPTOR product We are

More information

Bandwidth Management for Peer-to-Peer Applications

Bandwidth Management for Peer-to-Peer Applications Overview Bandwidth Management for Peer-to-Peer Applications With the increasing proliferation of broadband, more and more users are using Peer-to-Peer (P2P) protocols to share very large files, including

More information

Local Anomaly Detection for Network System Log Monitoring

Local Anomaly Detection for Network System Log Monitoring Local Anomaly Detection for Network System Log Monitoring Pekka Kumpulainen Kimmo Hätönen Tampere University of Technology Nokia Siemens Networks pekka.kumpulainen@tut.fi kimmo.hatonen@nsn.com Abstract

More information

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall Chapter 2: Security Techniques Background Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application Layer Chapter 5: Security Concepts for Networks Firewalls Intrusion Detection

More information

Using Data Mining for Mobile Communication Clustering and Characterization

Using Data Mining for Mobile Communication Clustering and Characterization Using Data Mining for Mobile Communication Clustering and Characterization A. Bascacov *, C. Cernazanu ** and M. Marcu ** * Lasting Software, Timisoara, Romania ** Politehnica University of Timisoara/Computer

More information

2002 IEEE. Reprinted with permission.

2002 IEEE. Reprinted with permission. Laiho J., Kylväjä M. and Höglund A., 2002, Utilization of Advanced Analysis Methods in UMTS Networks, Proceedings of the 55th IEEE Vehicular Technology Conference ( Spring), vol. 2, pp. 726-730. 2002 IEEE.

More information

International Journal of Computer Science and Applications Vol. 6, No. 3, pp 20 32, 2009

International Journal of Computer Science and Applications Vol. 6, No. 3, pp 20 32, 2009 International Journal of Computer Science and Applications Vol. 6, No. 3, pp 20 32, 2009 Technomathematics Research Foundation ATTACK CLASSIFICATION BASED ON DATA MINING TECHNIQUE AND ITS APPLICATION FOR

More information

Using Smoothed Data Histograms for Cluster Visualization in Self-Organizing Maps

Using Smoothed Data Histograms for Cluster Visualization in Self-Organizing Maps Technical Report OeFAI-TR-2002-29, extended version published in Proceedings of the International Conference on Artificial Neural Networks, Springer Lecture Notes in Computer Science, Madrid, Spain, 2002.

More information

On the use of Three-dimensional Self-Organizing Maps for Visualizing Clusters in Geo-referenced Data

On the use of Three-dimensional Self-Organizing Maps for Visualizing Clusters in Geo-referenced Data On the use of Three-dimensional Self-Organizing Maps for Visualizing Clusters in Geo-referenced Data Jorge M. L. Gorricha and Victor J. A. S. Lobo CINAV-Naval Research Center, Portuguese Naval Academy,

More information

Information Visualization with Self-Organizing Maps

Information Visualization with Self-Organizing Maps Information Visualization with Self-Organizing Maps Jing Li Abstract: The Self-Organizing Map (SOM) is an unsupervised neural network algorithm that projects highdimensional data onto a two-dimensional

More information

A Review of Data Clustering Approaches

A Review of Data Clustering Approaches A Review of Data Clustering Approaches Vaishali Aggarwal, Anil Kumar Ahlawat, B.N Panday Abstract- Fast retrieval of the relevant information from the databases has always been a significant issue. Different

More information

Web Usage Mining: Identification of Trends Followed by the user through Neural Network

Web Usage Mining: Identification of Trends Followed by the user through Neural Network International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 7 (2013), pp. 617-624 International Research Publications House http://www. irphouse.com /ijict.htm Web

More information

Cisco Network Analysis Module Software 4.0

Cisco Network Analysis Module Software 4.0 Cisco Network Analysis Module Software 4.0 Overview Presentation Improve Operational Efficiency with Increased Network and Application Visibility 1 Enhancing Operational Manageability Optimize Application

More information

Transforming the Telecoms Business using Big Data and Analytics

Transforming the Telecoms Business using Big Data and Analytics Transforming the Telecoms Business using Big Data and Analytics Event: ICT Forum for HR Professionals Venue: Meikles Hotel, Harare, Zimbabwe Date: 19 th 21 st August 2015 AFRALTI 1 Objectives Describe

More information

Attack and Defense Techniques

Attack and Defense Techniques Network Security Attack and Defense Techniques Anna Sperotto, Ramin Sadre Design and Analysis of Communication Networks (DACS) University of Twente The Netherlands Attack Taxonomy Many different kind of

More information

ANALYSIS OF MOBILE RADIO ACCESS NETWORK USING THE SELF-ORGANIZING MAP

ANALYSIS OF MOBILE RADIO ACCESS NETWORK USING THE SELF-ORGANIZING MAP ANALYSIS OF MOBILE RADIO ACCESS NETWORK USING THE SELF-ORGANIZING MAP Kimmo Raivio, Olli Simula, Jaana Laiho and Pasi Lehtimäki Helsinki University of Technology Laboratory of Computer and Information

More information

The Picture must be Clear. IPTV Quality of Experience

The Picture must be Clear. IPTV Quality of Experience The Picture must be Clear IPTV Quality of Experience 1 Video-over-IP vs IPTV? Video-over-IP A technology for moving video from A to B How about: Video-over-wire? Video-over-UHF? Video-over-Satellite? Can

More information

A Partially Supervised Metric Multidimensional Scaling Algorithm for Textual Data Visualization

A Partially Supervised Metric Multidimensional Scaling Algorithm for Textual Data Visualization A Partially Supervised Metric Multidimensional Scaling Algorithm for Textual Data Visualization Ángela Blanco Universidad Pontificia de Salamanca ablancogo@upsa.es Spain Manuel Martín-Merino Universidad

More information

Workplace Accidents Analysis with a Coupled Clustering Methods: S.O.M. and K-means Algorithms

Workplace Accidents Analysis with a Coupled Clustering Methods: S.O.M. and K-means Algorithms A publication of CHEMICAL ENGINEERING TRANSACTIONS VOL. 43, 2015 Chief Editors: Sauro Pierucci, Jiří J. Klemeš Copyright 2015, AIDIC Servizi S.r.l., ISBN 978-88-95608-34-1; ISSN 2283-9216 The Italian Association

More information

How To Understand A Network Attack

How To Understand A Network Attack Network Security Attack and Defense Techniques Anna Sperotto (with material from Ramin Sadre) Design and Analysis of Communication Networks (DACS) University of Twente The Netherlands Attacks! Many different

More information

Monitoring of Complex Industrial Processes based on Self-Organizing Maps and Watershed Transformations

Monitoring of Complex Industrial Processes based on Self-Organizing Maps and Watershed Transformations Monitoring of Complex Industrial Processes based on Self-Organizing Maps and Watershed Transformations Christian W. Frey 2012 Monitoring of Complex Industrial Processes based on Self-Organizing Maps and

More information

Credit Card Fraud Detection Using Self Organised Map

Credit Card Fraud Detection Using Self Organised Map International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 13 (2014), pp. 1343-1348 International Research Publications House http://www. irphouse.com Credit Card Fraud

More information

UNIVERSITY OF BOLTON SCHOOL OF ENGINEERING MS SYSTEMS ENGINEERING AND ENGINEERING MANAGEMENT SEMESTER 1 EXAMINATION 2015/2016 INTELLIGENT SYSTEMS

UNIVERSITY OF BOLTON SCHOOL OF ENGINEERING MS SYSTEMS ENGINEERING AND ENGINEERING MANAGEMENT SEMESTER 1 EXAMINATION 2015/2016 INTELLIGENT SYSTEMS TW72 UNIVERSITY OF BOLTON SCHOOL OF ENGINEERING MS SYSTEMS ENGINEERING AND ENGINEERING MANAGEMENT SEMESTER 1 EXAMINATION 2015/2016 INTELLIGENT SYSTEMS MODULE NO: EEM7010 Date: Monday 11 th January 2016

More information

Visualising Class Distribution on Self-Organising Maps

Visualising Class Distribution on Self-Organising Maps Visualising Class Distribution on Self-Organising Maps Rudolf Mayer, Taha Abdel Aziz, and Andreas Rauber Institute for Software Technology and Interactive Systems Vienna University of Technology Favoritenstrasse

More information

They can be obtained in HQJHQH format directly from the home page at: http://www.engene.cnb.uam.es/downloads/kobayashi.dat

They can be obtained in HQJHQH format directly from the home page at: http://www.engene.cnb.uam.es/downloads/kobayashi.dat HQJHQH70 *XLGHG7RXU This document contains a Guided Tour through the HQJHQH platform and it was created for training purposes with respect to the system options and analysis possibilities. It is not intended

More information

Data Mining. 1 Introduction 2 Data Mining methods. Alfred Holl Data Mining 1

Data Mining. 1 Introduction 2 Data Mining methods. Alfred Holl Data Mining 1 Data Mining 1 Introduction 2 Data Mining methods Alfred Holl Data Mining 1 1 Introduction 1.1 Motivation 1.2 Goals and problems 1.3 Definitions 1.4 Roots 1.5 Data Mining process 1.6 Epistemological constraints

More information

Using reporting and data mining techniques to improve knowledge of subscribers; applications to customer profiling and fraud management

Using reporting and data mining techniques to improve knowledge of subscribers; applications to customer profiling and fraud management Using reporting and data mining techniques to improve knowledge of subscribers; applications to customer profiling and fraud management Paper Jean-Louis Amat Abstract One of the main issues of operators

More information

Fuel Cell Health Monitoring Using Self Organizing Maps

Fuel Cell Health Monitoring Using Self Organizing Maps A publication of CHEMICAL ENGINEERINGTRANSACTIONS VOL. 33, 2013 Guest Editors: Enrico Zio, Piero Baraldi Copyright 2013, AIDIC ServiziS.r.l., ISBN 978-88-95608-24-2; ISSN 1974-9791 The Italian Association

More information

MANAGING QUEUE STABILITY USING ART2 IN ACTIVE QUEUE MANAGEMENT FOR CONGESTION CONTROL

MANAGING QUEUE STABILITY USING ART2 IN ACTIVE QUEUE MANAGEMENT FOR CONGESTION CONTROL MANAGING QUEUE STABILITY USING ART2 IN ACTIVE QUEUE MANAGEMENT FOR CONGESTION CONTROL G. Maria Priscilla 1 and C. P. Sumathi 2 1 S.N.R. Sons College (Autonomous), Coimbatore, India 2 SDNB Vaishnav College

More information

Digital Subscriber Line (DSL)

Digital Subscriber Line (DSL) CHAPTER 9 This chapter describes the level of support that Cisco ANA provides for DSL, as follows: Technology Description, page 9-1 Inventory and Information Model Objects (IMOs), page 9-2 Vendor-Specific

More information

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

A Review of Anomaly Detection Techniques in Network Intrusion Detection System A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In

More information

Extreme Networks CoreFlow2 Technology TECHNOLOGY STRATEGY BRIEF

Extreme Networks CoreFlow2 Technology TECHNOLOGY STRATEGY BRIEF Extreme Networks CoreFlow2 Technology TECHNOLOGY STRATEGY BRIEF TECHNOLOGY STRATEGY BRIEF Extreme Networks CoreFlow2 Technology Benefits INCREASED VISIBILITY Detailed monitoring of applications, their

More information

Grid Density Clustering Algorithm

Grid Density Clustering Algorithm Grid Density Clustering Algorithm Amandeep Kaur Mann 1, Navneet Kaur 2, Scholar, M.Tech (CSE), RIMT, Mandi Gobindgarh, Punjab, India 1 Assistant Professor (CSE), RIMT, Mandi Gobindgarh, Punjab, India 2

More information

Data Mining Analysis of a Complex Multistage Polymer Process

Data Mining Analysis of a Complex Multistage Polymer Process Data Mining Analysis of a Complex Multistage Polymer Process Rolf Burghaus, Daniel Leineweber, Jörg Lippert 1 Problem Statement Especially in the highly competitive commodities market, the chemical process

More information

Customer Data Mining and Visualization by Generative Topographic Mapping Methods

Customer Data Mining and Visualization by Generative Topographic Mapping Methods Customer Data Mining and Visualization by Generative Topographic Mapping Methods Jinsan Yang and Byoung-Tak Zhang Artificial Intelligence Lab (SCAI) School of Computer Science and Engineering Seoul National

More information

How Organisations Are Using Data Mining Techniques To Gain a Competitive Advantage John Spooner SAS UK

How Organisations Are Using Data Mining Techniques To Gain a Competitive Advantage John Spooner SAS UK How Organisations Are Using Data Mining Techniques To Gain a Competitive Advantage John Spooner SAS UK Agenda Analytics why now? The process around data and text mining Case Studies The Value of Information

More information

Data Mining using Rule Extraction from Kohonen Self-Organising Maps

Data Mining using Rule Extraction from Kohonen Self-Organising Maps Data Mining using Rule Extraction from Kohonen Self-Organising Maps James Malone, Kenneth McGarry, Stefan Wermter and Chris Bowerman School of Computing and Technology, University of Sunderland, St Peters

More information

CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA

CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA Professor Yang Xiang Network Security and Computing Laboratory (NSCLab) School of Information Technology Deakin University, Melbourne, Australia http://anss.org.au/nsclab

More information

INTERNET TRAFFIC CLUSTERING USING PACKET HEADER INFORMATION

INTERNET TRAFFIC CLUSTERING USING PACKET HEADER INFORMATION INTERNET TRAFFIC CLUSTERING USING PACKET HEADER INFORMATION Pekka Kumpulainen 1, Kimmo Hätönen 2, Olli Knuuti 3 and Teemu Alapaholuoma 1 1 Pori Unit, Tampere University of Technology, Pori, Finland 2 CTO

More information

Introducing IBM s Advanced Threat Protection Platform

Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Extensible Approach to Threat Prevention Paul Kaspian Senior Product Marketing Manager IBM Security Systems 1 IBM NDA 2012 Only IBM

More information

P2P Traffic Manager. L7 Internet Security. IP Appliance Products

P2P Traffic Manager. L7 Internet Security. IP Appliance Products IP Appliance Products P2P Traffic Manager L7 Internet Security Headquarter 13 Fl., Eunsung Bldg., 53-8 Cheongdamdong Kangnamgu Seoul, Korea 135-763 Tel +822-3446-6070 Fax +822-3445-9099 R&D Center 34 Gajeongdong,

More information

Introduction. A. Bellaachia Page: 1

Introduction. A. Bellaachia Page: 1 Introduction 1. Objectives... 3 2. What is Data Mining?... 4 3. Knowledge Discovery Process... 5 4. KD Process Example... 7 5. Typical Data Mining Architecture... 8 6. Database vs. Data Mining... 9 7.

More information

Efficiently Managing Firewall Conflicting Policies

Efficiently Managing Firewall Conflicting Policies Efficiently Managing Firewall Conflicting Policies 1 K.Raghavendra swamy, 2 B.Prashant 1 Final M Tech Student, 2 Associate professor, Dept of Computer Science and Engineering 12, Eluru College of Engineeering

More information

IP Network Monitoring and Measurements: Techniques and Experiences

IP Network Monitoring and Measurements: Techniques and Experiences IP Network Monitoring and Measurements: Techniques and Experiences Philippe Owezarski LAAS-CNRS Toulouse, France Owe@laas.fr 1 Outline 4 Introduction 4 Monitoring problematic 8Only based on network administration

More information

Introduction to Meg@POP

Introduction to Meg@POP Introduction to Meg@POP SingTel Meg@POP is a comprehensive suite of IP services for businesses which need a secured connection to multiple locations, parties or services in Singapore. It provides a simple

More information

The KDD Process: Applying Data Mining

The KDD Process: Applying Data Mining The KDD Process: Applying Nuno Cavalheiro Marques (nmm@di.fct.unl.pt) Spring Semester 2010/2011 MSc in Computer Science Outline I 1 Knowledge Discovery in Data beyond the Computer 2 by Visualization Lift

More information

Identifying the Number of Visitors to improve Website Usability from Educational Institution Web Log Data

Identifying the Number of Visitors to improve Website Usability from Educational Institution Web Log Data Identifying the Number of to improve Website Usability from Educational Institution Web Log Data Arvind K. Sharma Dept. of CSE Jaipur National University, Jaipur, Rajasthan,India P.C. Gupta Dept. of CSI

More information

Clustering of the Self-Organizing Map

Clustering of the Self-Organizing Map 586 IEEE TRANSACTIONS ON NEURAL NETWORKS, VOL. 11, NO. 3, MAY 2000 Clustering of the Self-Organizing Map Juha Vesanto and Esa Alhoniemi, Student Member, IEEE Abstract The self-organizing map (SOM) is an

More information

Expanding Self-organizing Map for Data. Visualization and Cluster Analysis

Expanding Self-organizing Map for Data. Visualization and Cluster Analysis Expanding Self-organizing Map for Data Visualization and Cluster Analysis Huidong Jin a,b, Wing-Ho Shum a, Kwong-Sak Leung a, Man-Leung Wong c a Department of Computer Science and Engineering, The Chinese

More information

Data Mining for Customer Service Support. Senioritis Seminar Presentation Megan Boice Jay Carter Nick Linke KC Tobin

Data Mining for Customer Service Support. Senioritis Seminar Presentation Megan Boice Jay Carter Nick Linke KC Tobin Data Mining for Customer Service Support Senioritis Seminar Presentation Megan Boice Jay Carter Nick Linke KC Tobin Traditional Hotline Services Problem Traditional Customer Service Support (manufacturing)

More information

Audiovisual Services over ADSL

Audiovisual Services over ADSL Audiovisual Services over ADSL November 17, 2004 Pierre Quentel FT/R&D Division Laboratory "Distribution and Protection of Contents" Le présent document contient des inf ormations qui sont la propriété

More information

Predict Influencers in the Social Network

Predict Influencers in the Social Network Predict Influencers in the Social Network Ruishan Liu, Yang Zhao and Liuyu Zhou Email: rliu2, yzhao2, lyzhou@stanford.edu Department of Electrical Engineering, Stanford University Abstract Given two persons

More information

Hunting for the Undefined Threat: Advanced Analytics & Visualization

Hunting for the Undefined Threat: Advanced Analytics & Visualization SESSION ID: ANF-W04 Hunting for the Undefined Threat: Advanced Analytics & Visualization Joshua Stevens Enterprise Security Architect Hewlett-Packard Cyber Security Technology Office Defining the Hunt

More information

PRACTICAL DATA MINING IN A LARGE UTILITY COMPANY

PRACTICAL DATA MINING IN A LARGE UTILITY COMPANY QÜESTIIÓ, vol. 25, 3, p. 509-520, 2001 PRACTICAL DATA MINING IN A LARGE UTILITY COMPANY GEORGES HÉBRAIL We present in this paper the main applications of data mining techniques at Electricité de France,

More information

How To Monitor And Test An Ethernet Network On A Computer Or Network Card

How To Monitor And Test An Ethernet Network On A Computer Or Network Card 3. MONITORING AND TESTING THE ETHERNET NETWORK 3.1 Introduction The following parameters are covered by the Ethernet performance metrics: Latency (delay) the amount of time required for a frame to travel

More information

Network Monitoring and Traffic CSTNET, CNIC

Network Monitoring and Traffic CSTNET, CNIC Network Monitoring and Traffic Analysis in CSTNET Chunjing Han Aug. 2013 CSTNET, CNIC Topics 1. The background of network monitoring 2. Network monitoring protocols and related tools 3. Network monitoring

More information

NETWORK-BASED INTRUSION DETECTION USING NEURAL NETWORKS

NETWORK-BASED INTRUSION DETECTION USING NEURAL NETWORKS 1 NETWORK-BASED INTRUSION DETECTION USING NEURAL NETWORKS ALAN BIVENS biven@cs.rpi.edu RASHEDA SMITH smithr2@cs.rpi.edu CHANDRIKA PALAGIRI palgac@cs.rpi.edu BOLESLAW SZYMANSKI szymansk@cs.rpi.edu MARK

More information

TCP/IP Basis. OSI Model

TCP/IP Basis. OSI Model TCP/IP Basis 高 雄 大 學 資 訊 工 程 學 系 嚴 力 行 Source OSI Model Destination Application Presentation Session Transport Network Data-Link Physical ENCAPSULATION DATA SEGMENT PACKET FRAME BITS 0101010101010101010

More information

The Dependence of Internet User Traffic Characteristics on Access Speed

The Dependence of Internet User Traffic Characteristics on Access Speed University of Würzburg Institute of Computer Science Research Report Series The Dependence of Internet User Traffic Characteristics on Access Speed Norbert Vicari*, Stefan Köhler* and Joachim Charzinski

More information

Secure Networks for Process Control

Secure Networks for Process Control Secure Networks for Process Control Leveraging a Simple Yet Effective Policy Framework to Secure the Modern Process Control Network An Enterasys Networks White Paper There is nothing more important than

More information

VISUALIZATION OF GEOSPATIAL DATA BY COMPONENT PLANES AND U-MATRIX

VISUALIZATION OF GEOSPATIAL DATA BY COMPONENT PLANES AND U-MATRIX VISUALIZATION OF GEOSPATIAL DATA BY COMPONENT PLANES AND U-MATRIX Marcos Aurélio Santos da Silva 1, Antônio Miguel Vieira Monteiro 2 and José Simeão Medeiros 2 1 Embrapa Tabuleiros Costeiros - Laboratory

More information

Improving Network Efficiency for SMB Through Intelligent Load Balancing

Improving Network Efficiency for SMB Through Intelligent Load Balancing Improving Network Efficiency for SMB Through Intelligent Load Balancing White Paper Series WP100134 Mike Mo, VP of Engineering January 2005 Abstract: As reliable Internet connectivity becomes a daily business

More information

Stochastic Protocol Modeling for Anomaly-Based Network Intrusion Detection

Stochastic Protocol Modeling for Anomaly-Based Network Intrusion Detection 2003 IEEE International Workshop on Information Assurance March 24th, 2003 Darmstadt, Germany Stochastic Protocol Modeling for Anomaly-Based Network Intrusion Detection Juan M. Estévez-Tapiador (tapiador@ugr.es)

More information

Data topology visualization for the Self-Organizing Map

Data topology visualization for the Self-Organizing Map Data topology visualization for the Self-Organizing Map Kadim Taşdemir and Erzsébet Merényi Rice University - Electrical & Computer Engineering 6100 Main Street, Houston, TX, 77005 - USA Abstract. The

More information

Efficient Security Alert Management System

Efficient Security Alert Management System Efficient Security Alert Management System Minoo Deljavan Anvary IT Department School of e-learning Shiraz University Shiraz, Fars, Iran Majid Ghonji Feshki Department of Computer Science Qzvin Branch,

More information

The Research of Data Mining Based on Neural Networks

The Research of Data Mining Based on Neural Networks 2011 International Conference on Computer Science and Information Technology (ICCSIT 2011) IPCSIT vol. 51 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V51.09 The Research of Data Mining

More information

Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion

Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion Network Security Tampere Seminar 23rd October 2008 1 Copyright 2008 Hirschmann 2008 Hirschmann Automation and and Control GmbH. Contents Overview Switch Security Firewalls Conclusion 2 Copyright 2008 Hirschmann

More information

Cover. White Paper. (nchronos 4.1)

Cover. White Paper. (nchronos 4.1) Cover White Paper (nchronos 4.1) Copyright Copyright 2013 Colasoft LLC. All rights reserved. Information in this document is subject to change without notice. No part of this document may be reproduced

More information

DATA MINING TECHNOLOGY. Keywords: data mining, data warehouse, knowledge discovery, OLAP, OLAM.

DATA MINING TECHNOLOGY. Keywords: data mining, data warehouse, knowledge discovery, OLAP, OLAM. DATA MINING TECHNOLOGY Georgiana Marin 1 Abstract In terms of data processing, classical statistical models are restrictive; it requires hypotheses, the knowledge and experience of specialists, equations,

More information

Quick Guide of HiDDNS Settings (with UPnP)

Quick Guide of HiDDNS Settings (with UPnP) Quick Guide of HiDDNS Settings (with UPnP) Solution 1: With the development of surveillance systems, more and more users want to use ADSL to realize video surveillance through network. But ADSL gives dynamic

More information

Understanding Web personalization with Web Usage Mining and its Application: Recommender System

Understanding Web personalization with Web Usage Mining and its Application: Recommender System Understanding Web personalization with Web Usage Mining and its Application: Recommender System Manoj Swami 1, Prof. Manasi Kulkarni 2 1 M.Tech (Computer-NIMS), VJTI, Mumbai. 2 Department of Computer Technology,

More information

Data Mining for Fun and Profit

Data Mining for Fun and Profit Data Mining for Fun and Profit Data mining is the extraction of implicit, previously unknown, and potentially useful information from data. - Ian H. Witten, Data Mining: Practical Machine Learning Tools

More information

Topological Tree Clustering of Social Network Search Results

Topological Tree Clustering of Social Network Search Results Topological Tree Clustering of Social Network Search Results Richard T. Freeman Capgemini, FS Business Information Management No. 1 Forge End, Woking, Surrey, GU21 6DB United Kingdom richard.freeman@capgemini.com

More information

CITY UNIVERSITY OF HONG KONG 香 港 城 市 大 學. Self-Organizing Map: Visualization and Data Handling 自 組 織 神 經 網 絡 : 可 視 化 和 數 據 處 理

CITY UNIVERSITY OF HONG KONG 香 港 城 市 大 學. Self-Organizing Map: Visualization and Data Handling 自 組 織 神 經 網 絡 : 可 視 化 和 數 據 處 理 CITY UNIVERSITY OF HONG KONG 香 港 城 市 大 學 Self-Organizing Map: Visualization and Data Handling 自 組 織 神 經 網 絡 : 可 視 化 和 數 據 處 理 Submitted to Department of Electronic Engineering 電 子 工 程 學 系 in Partial Fulfillment

More information

A Study of Web Traffic Analysis

A Study of Web Traffic Analysis Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IJCSMC, Vol. 3, Issue.

More information

Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches

Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches PhD Thesis by Payam Birjandi Director: Prof. Mihai Datcu Problematic

More information

Intelligent Network Monitoring for Your LAN, WAN and ATM Network

Intelligent Network Monitoring for Your LAN, WAN and ATM Network Intelligent Network Monitoring for Your LAN, WAN and ATM Network Solutions ZettaE2E Intelligent Network Monitoring for Your LAN, WAN and ATM Network Key Benefits Reduce current and future LAN, WAN and

More information

Intrusion Detection. Jeffrey J.P. Tsai. Imperial College Press. A Machine Learning Approach. Zhenwei Yu. University of Illinois, Chicago, USA

Intrusion Detection. Jeffrey J.P. Tsai. Imperial College Press. A Machine Learning Approach. Zhenwei Yu. University of Illinois, Chicago, USA SERIES IN ELECTRICAL AND COMPUTER ENGINEERING Intrusion Detection A Machine Learning Approach Zhenwei Yu University of Illinois, Chicago, USA Jeffrey J.P. Tsai Asia University, University of Illinois,

More information

Communications and Computer Networks

Communications and Computer Networks SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the

More information

EFFICIENT DATA PRE-PROCESSING FOR DATA MINING

EFFICIENT DATA PRE-PROCESSING FOR DATA MINING EFFICIENT DATA PRE-PROCESSING FOR DATA MINING USING NEURAL NETWORKS JothiKumar.R 1, Sivabalan.R.V 2 1 Research scholar, Noorul Islam University, Nagercoil, India Assistant Professor, Adhiparasakthi College

More information

How to use Big Data in Industry 4.0 implementations. LAURI ILISON, PhD Head of Big Data and Machine Learning

How to use Big Data in Industry 4.0 implementations. LAURI ILISON, PhD Head of Big Data and Machine Learning How to use Big Data in Industry 4.0 implementations LAURI ILISON, PhD Head of Big Data and Machine Learning Big Data definition? Big Data is about structured vs unstructured data Big Data is about Volume

More information

How To Use Neural Networks In Data Mining

How To Use Neural Networks In Data Mining International Journal of Electronics and Computer Science Engineering 1449 Available Online at www.ijecse.org ISSN- 2277-1956 Neural Networks in Data Mining Priyanka Gaur Department of Information and

More information

Load Balance Mechanism

Load Balance Mechanism Load Balance Application in Dual-WAN Interface Load Balance Mechanism To which WAN port the traffic will be routed is determined according to the Load Balance mechanism. Below diagram shows how Vigor router

More information

Neural Network Add-in

Neural Network Add-in Neural Network Add-in Version 1.5 Software User s Guide Contents Overview... 2 Getting Started... 2 Working with Datasets... 2 Open a Dataset... 3 Save a Dataset... 3 Data Pre-processing... 3 Lagging...

More information

Data Mining Solutions for the Business Environment

Data Mining Solutions for the Business Environment Database Systems Journal vol. IV, no. 4/2013 21 Data Mining Solutions for the Business Environment Ruxandra PETRE University of Economic Studies, Bucharest, Romania ruxandra_stefania.petre@yahoo.com Over

More information

Proceedings - AutoCarto 2012 - Columbus, Ohio, USA - September 16-18, 2012

Proceedings - AutoCarto 2012 - Columbus, Ohio, USA - September 16-18, 2012 Data Mining of Collaboratively Collected Geographic Crime Information Using an Unsupervised Neural Network Approach Julian Hagenauer, Marco Helbich (corresponding author), Michael Leitner, Jerry Ratcliffe,

More information

USING SELF-ORGANIZING MAPS FOR INFORMATION VISUALIZATION AND KNOWLEDGE DISCOVERY IN COMPLEX GEOSPATIAL DATASETS

USING SELF-ORGANIZING MAPS FOR INFORMATION VISUALIZATION AND KNOWLEDGE DISCOVERY IN COMPLEX GEOSPATIAL DATASETS USING SELF-ORGANIZING MAPS FOR INFORMATION VISUALIZATION AND KNOWLEDGE DISCOVERY IN COMPLEX GEOSPATIAL DATASETS Koua, E.L. International Institute for Geo-Information Science and Earth Observation (ITC).

More information

From Network Security To Content Filtering

From Network Security To Content Filtering Computer Fraud & Security, May 2007 page 1/10 From Network Security To Content Filtering Network security has evolved dramatically in the last few years not only for what concerns the tools at our disposals

More information

Dotted Chart and Control-Flow Analysis for a Loan Application Process

Dotted Chart and Control-Flow Analysis for a Loan Application Process Dotted Chart and Control-Flow Analysis for a Loan Application Process Thomas Molka 1,2, Wasif Gilani 1 and Xiao-Jun Zeng 2 Business Intelligence Practice, SAP Research, Belfast, UK The University of Manchester,

More information

Protocols. Packets. What's in an IP packet

Protocols. Packets. What's in an IP packet Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets

More information