2018
DOI: 10.1007/s11042-017-5495-y
|View full text |Cite
|
Sign up to set email alerts
|

Big network traffic data visualization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 34 publications
0
4
0
Order By: Relevance
“…Dimension reduction methods aim to project high-dimension datasets into low-dimension datasets, which facilitate the visualization of big traffic data on 2D or 3D figures. For example, the t-SNE method achieves great performance in dimension reduction for various applications, such as traffic speed [43], geographical location data [44], traffic flow [45,46], and driving behaviors [47]. It would be interesting to investigate the use of t-SNE in parking data analysis.…”
Section: Data-driven Clustering Methodsmentioning
confidence: 99%
“…Dimension reduction methods aim to project high-dimension datasets into low-dimension datasets, which facilitate the visualization of big traffic data on 2D or 3D figures. For example, the t-SNE method achieves great performance in dimension reduction for various applications, such as traffic speed [43], geographical location data [44], traffic flow [45,46], and driving behaviors [47]. It would be interesting to investigate the use of t-SNE in parking data analysis.…”
Section: Data-driven Clustering Methodsmentioning
confidence: 99%
“…The direction, inter-packet length, and inter-arrival times are the most important properties in the flow-based feature formulation: total duration (dur) and destination-to-source-time-to-live (dttl) are two examples of flow-based features. The features are categorized into three sets, namely basic (6)(7)(8)(9)(10)(11)(12)(13)(14)(15)(16)(17)(18), content (19)(20)(21)(22)(23)(24)(25)(26), and time (27)(28)(29)(30)(31)(32)(33)(34)(35). Features 36-40 and 41-47 are labeled as general-purpose features and connection features, respectively.…”
Section: Unsw-nb15 Datasetmentioning
confidence: 99%
“…Ruan et al 12,13 deployed a hash algorithm, weight table, and sampling method to address volume, variety, and velocity issues arising from big data. They formed a weight table and assigned large weights to the classes with a smaller population to guarantee the less probable data records to be selected by the sampling method.…”
Section: Introductionmentioning
confidence: 99%
“…Profiling a network traffic involves finding metadata in a large amount of data [16] that moved across network at certain time [17]. Example of network traffic profiling usage is to understand Internet users' behavior [18] and to map the level of security treat and identify suspected abuser [10].…”
Section: Review Of the Literaturementioning
confidence: 99%