Next Article in Journal
The Touch and Feel of the Past—Using Haptic and VR Artefacts to Enrich Reminiscence Therapy for People with Dementia
Previous Article in Journal
Special Issue on “Wearable Technologies”
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Traffic Similarity Observation Using a Genetic Algorithm and Clustering

Department of Telecommunication, Brno University of Technology, 616 00 Brno, Czech Republic
*
Author to whom correspondence should be addressed.
Technologies 2018, 6(4), 103; https://doi.org/10.3390/technologies6040103
Submission received: 27 October 2018 / Revised: 8 November 2018 / Accepted: 9 November 2018 / Published: 11 November 2018

Abstract

:
This article presents a technique of traffic similarity observation based on the statistical method of survival analysis by using a genetic algorithm. The basis comes from the k-means clustering algorithm. The observed traffic is collected from different network sources by using a NetFlow collector. The purpose of this technique is to propose a process of finding spread malicious traffic, e.g., ransomware, and considers the possibility of implementing a genetic-based algorithm. In our solution, a chromosome is created from clustering k-means centers, and the Davies–Bouldin validity index is used as the second fitness value in the solution.

1. Introduction

Recently, the computer world has been facing problems with many types of cyber-attacks. Attackers use malicious software or codes to obtain the privileged rights to clients’ computers. Ransomware [1] is one such malicious code. Typically, it generates cyclically repetitive communication with command and control points or nonexistent domains. This behavior can produce an anomaly that can be observed and analyzed.
Based on previous research [2], we found a possible way to filter traffic and collect such repetitive behavior. We used survival analysis [3] and NetFlow messages [4] collected from Cisco network devices. The analysis creates survival curves [5] of origin–destination traffic in a specific time window. A sample of the graphical output from the survival analysis can be seen in Figure 1. All traffic can be examined from such a perspective, not to observe the proper survival time but to determine a format or pattern of traffic. Each curve is unique, as it depends on the type of traffic. The blue part is called “confidence intervals” and is the measure of possible variability.
We have implemented our genetic cluster algorithm to find the similarity or closeness of each curve as part of the continuous development of our genetic decision probe (GDP) application [6]. An output of our analysis is the clustering of traffic into groups based on the minimum Euclidean distance. In principle, if there is network traffic displayed in the presented curves, it is possible to compare the similarity of such curves. This can be done by the presented algorithm. This may be useful, for example, for detecting the repetitive traffic of ransomware from captured data in different parts of the network that would otherwise look like normal network traffic.
This article presents the idea and compares our genetic-based algorithm with a k-means algorithm, which was also programmed by our team. The idea is to use a genetic algorithm instead of the common approach to develop an auto-adaptive and extendible solution for an field-programmable gate array (FPGA) [7] hardware system, and we compare each of the proposed and considered algorithms with the classical one.

2. Related Work

Genetic algorithms are often used to improve current detection methods. We can find many articles related to this topic and why genetic algorithms are a useful solution. In [8], the authors used a genetic algorithm to extract data in principal component analysis (PCA). In [9], the authors applied it to the calculation of matrices of Euclidean distance. Related to the clustering problem and the use of genetic algorithms (GAs), in the past, many applications based on genetic clustering algorithms were developed. They use different representations for chromosomes, fitness functions, crossover, etc.
In [10], they presented a solution that uses a genetic algorithm with gene rearrangement for K-means clustering. Here, each chromosome is described by a sequence of M = N K real-valued numbers, where N is the dimension of the feature space, and K is the number of clusters. For crossover, the path-based crossover operator has been used to build a path between two parent chromosomes.
In [11], the authors presented an efficient genetic algorithm-based clustering technique that utilizes the principles of a k-means algorithm. The chromosome is created in the same way. It is represented by a sequence of N K floating point numbers.
In their subsequent publication [12], the authors presented a genetic algorithm-based clustering technique, called GA-clustering. Generally, we can say that a chromosome is commonly created in two ways. The first solution maintains all centroids and data, and the second solution creates chromosomes only from centroids.
As a fitness measurement of an individual, the error measure from the minimum of the Euclidean distance is used, or a second measurement is added, for example, using a silhouette function. This second measureis used to measure the proportionality of centroids.
In our solution, a chromosome is created only from centroids, and the data are associated in each fitness observation. As the second measurement of the fitness, we used the Davies–Bouldin validity index.
Regarding FPGA and the possibility of implementing a genetic algorithm, for a full overview for readers, a genetic IP-based core was developed and tested in [13].

3. Algorithms

In this section, k-means and genetic-based algorithms are presented. First, the principle of using survival analysis is presented.

Survival Analysis

The survival function S ( t ) is defined by Equation (1). This function defines the probability that, at the end of the event or equivalent, the probability of survival until at least t does not occur at time t [3].
S ( t ) = P r ( T > t )
where 0 S ( t ) 1 , F T = 1 S ( t ) , and F T is the cumulative distribution function T, which means that S ( t ) is a non-increasing function of t.
To estimate the survival function, a Kaplan–Meier analysis (2) or Cox estimate is used.
S ^ ( t ) = j = 1 k n j d j n j = S ^ ( t ) 1 d t n t
where d j corresponds to the number of events, eventually the number of completed events in time j. So far, n j is related to the number of objects that are still observed in time j. In our case of NetFLow traffic collection, we use this survival analysis function to create a gene expression matrix during a time window. The gene expression matrix is given as G E M m , n = m × n for a time window w ( t ) , where m represents a set of solutions with n values; m = { n 1 , n 2 , , n ( t ) } of the set m in a given linear space. The example of the G E M m , n for our genetic cluster algorithm is presented in Table 1.
We work further with these values. In this example, the first four values are the time line, and the other four values are the probabilities for the time-line values. The sizes of the time-line axis and the probability axis are not limited.

4. K-Means Algorithm

The k-means algorithm uses the Euclidean distance [14]. By taking two vectors x = ( x 1 , x 2 , , x n ) and y = ( y 1 , y 2 , , y n ) as a two-dimensional finding of values, the Euclidean distance between x and y is then defined by Equation (3):
d ( x , y ) = ( x y ) ( x y ) .
Since each value contributes to the calculation of the Euclidean distance, the results can vary considerably, even with only a small change in the values. Generally, the k-means expression is defined as Equation (4):
i = 0 n min c j C ( x j c i 2 )
where c j represents centroids, and C represents clusters. The k-means algorithm, which has been implemented in this study, is created using the Lloyd algorithm. The means x X are the key values and are equal to min c I R d x X c x 2 . However, a simpler option is to use the distances d ( x , c ) = x c 2 . The slowest process, but one that reduces the restrictions previously described, is to choose the centroid c i according to { x X | ϕ C ( x ) = c i } . The class diagram of our k-means algorithm is shown in Figure 2.
The class GetDaviesBouldin is used in both the k-means and genetic-based algorithms to verify the correct distribution of centroids. It is a separated imported class. It also returns the sum of the Euclidean distance values. The Davies–Bouldin validity index expression has the following equation, adopted from [15]:
D B = 1 n i = 1 n max i j C n ( Q i ) + C n ( Q j ) C n ( Q i , Q j )
where C n ( Q i ) is the average distance inside the cluster from its center, and C n ( Q i , Q j ) is the distance between the clusters represented by centroids. The unittest TestCase [16] comes from the Python test package, and it is used here as the testing class. The main methods are implemented in the KmeansCase class, which takes the unittest as the object.
In the first step of the algorithm, c i = x i X is chosen, and the Euclidian distance calculation of a member x i against centroid c i follows. This member is then inserted into the fittest group. The centroids are recomputed and replaced by the mean value of all members of a cluster C k . The process is repeated until all members are assigned, as shown in Expression (6).
C k = { x n : x n c k x n c k } c k = 1 C k x n C k x n .
In the next convergence step, the algorithm compares each member with its own cluster and the neighboring cluster from the Euclidean distance point of view. If a more appropriate cluster is selected, the member is moved to this cluster. This step is repeated until there are no more member shifts.

5. Genetic Algorithm

The implemented genetic algorithm uses the previously created k-means algorithm class, and its partial diagram is shown in Figure 3.
The genetic algorithm works with chromosomes that represent a solution to the problem. In this case, a chromosome represents k genes for k centroids c i of clusters C.
The chromosome or individual α and, consequently, the population P are determined in the first step according to Equation (7). A centroid c i = x i , and x i represents a vector of values x i = { n 1 , n 2 , , n M } , where n represents elements of the set M from the gene matrices.
α i = ( c 1 , c 2 , , c k ) C | c k = c i X P = { α 1 , α 2 , , α C } .
The chromosome only keeps clusters’ centroids, and x i values are associated with this centroid just when evaluating an individual’s fitness. The x i valuesare released after the fitness evaluation.
The Euclidean distance and the Davies–Bouldin validity index are used to evaluate an individual. The genetic algorithm minimizes the sum of the Euclidean distance for all individual clusters. Expression (8) is the objective function f ( α ) of the problem.
minimize k = 1 K x n C k x n c k 2 according to c k , C k .
The criteria, i.e., the individual’s (chromosome) evaluation, are based on the sum of the mean distances inside the clusters, i.e., f ( α ) f i t 1 ( α ) and α i P : 0 < f ( α ) 1 < f ( α ) 2 . For example, for the number of clusters C = 4 , k = 4 , the individual contains four genes, with each gene representing the solution of one cluster. An example of the output is presented in Table 2.
The genetic algorithm selects individuals with the lowest value of the sum of the average distances in the population P. To simplify the running of the algorithm, this method is called from the imported custom class GetDaviesBouldin from the previous k-means solution. This class provides the calculation for the Davies–Bouldin validity index and returns its value to the dbIndex variable. This validity index is the second fitness measure.
The class population maintains the current population values, self.Chromosomes, and the evaluation of individuals in self.Fitness and self.interlen. This algorithm contains its own methods for comparing populations: OBJECT.__lt__(self, other) and eq, gt. Therefore, the minimum intra-cluster distance is always searched within two populations. One population represents the original population, and the other population is the same population after the crossover and mutation with the recalculated values of the fitness functions.
Thus, the evaluation of all populations is carried out in the framework of elitism. This is because the crossing is both vertical and horizontal between individuals in populations. Erroneous results (inf,null), broken down by zero, are filtered using the Python np.ma.masked_invalid package. This ensures that the wrong individuals are not selected. The crossover, mutation, and recalculation of fitness values are performed in each cycle. After that, populations are compared, and individuals are returned to those populations that satisfy the condition of choosing the best solution.
In the proposed solution, a method of crossing is created based on random selection, both in the chromosomes’ own genes and among the chromosomes. In the first step, the selected parts are crossed between the chromosomes, and the positions of the genes in the chromosomes are then changed. In this way, limiting the trapping of the solution in a local minimum is ensured.
Muting the solution ensures that there is no trapping at the local and global minima. In addition, this ensures that the current centroid values are not accidentally replaced by this mutation.
So far, centroid c i is equal to x i . In this part of the performed mutation, the GetDaviesBouldin class returns the value of x i C ( k ) . The chromosome is then formed according to the following equation:
α i : new = ( c 1 , c 2 , , c k ) C | c k = C ( k ) P = { α 1 , α 2 , , α S } c k : new = c k = x i | i , k : Ω ( 1 , N ) .
For example, a population with four chromosomes, each with three genes (three clusters), is created in the following format. An output from the GDP application is represented in Table 3.
In this example, each chromosome expresses a vector of survival analysis values. The ranges of the chromosomes and the population can be extended.

6. Results of the Genetic Algorithm Implementation

In testing the framework of our solution, comparative tests of the k-means algorithm and the genetic algorithm for the driver and circle test kits were performed. The dataset of circles was imported from the Python package sklearn.datasets.samples_generator [17] and the dataset of drivers from [18].
The dataset of drivers includes 4000 records, and it is used to test the robustness of algorithms. The second dataset is used to test the convergence of algorithms. The individual outputs in Table 4 and Table 5 show the observed values, which were the Davies–Bouldin validity indices and the average Euclidean distance in the data cluster. Furthermore, the time needed to run the algorithms was also monitored.
No dynamic increase or decrease in the number of centroids was expected with this solution. The results of the two algorithms were compared. Each test was run 10 times, and the best results are shown in the format of the GDP program console output. The distance number does not express a particular unit; it depends on what is being measured. The value “sum” represents the sum of the average distances in clusters. The lower score of the Davies–Bouldin index is better. Based on the repetition of the tests and the results, it can be concluded that GA had both faster data processing and a faster total calculation time. While increasing the population, the overall calculation time was increased. The processing time was also affected by data being read from datasets and by the hardware used.

7. Real Dataset of Traffic

The real dataset was imported during the application run from the GDP database into the supervisor module using the pandas:DataFrame package. An example of the composition of the custom dataset in an instance of the DataFrame is shown in Table 6.
This dataset is a gene matrix for every source to destination (SD). This simple example verifies the possibilities of working with the output values of survival analysis and the resolution of individual survival curves. For explanation, the dataset represents a group of addresses that communicated through a peer-to-peer (P2P) network that excludes one IP address.
Using the genetic algorithm, individual clusters were assembled. These clusters represent the survival curves that are closest to the Euclidean distance with respect to its lowest centroid value. Again, the results of both algorithms, GA and k-means, were compared.
From this point of view, the k-means algorithm assigned similar courses to the same cluster. In the next step, the genetic algorithm was verified. The resulting output is the average distance within the cluster for each cycle. The k-means and GA results are shown in Table 7. The GA minimization process of values can be seen in the same table. According to the similarity of curves and our awareness of where the IPs belong to, individual IP addresses were correctly assigned to clusters. These were IP addresses that communicated with each other.

8. Results

The genetic algorithm in the drivers–circles tests produced better results in terms of both the Davies–Bouldin validity index and the distribution of individuals in clusters depending on their Euclidean distance. In the case of the genetic algorithm, the result was no longer improved by increasing the number of iterations and the population sizes. The results are influenced by the initial random selection of centroids, as seen, for example, in the k-means algorithm in the driver dataset. Thus, the number of iterations and duration are both affected by this initial selection.
From a time perspective, the real-life example using the genetic algorithm was more demanding. Because of the algorithm profiling, it is time-consuming to create new instances of population classes. During repeated attempts, the error rate of the algorithm was determined, namely, the assignment of the same IP address to two different clusters. This error occurred when the algorithm ended the calculation with the output value of DB value > 0.01 . Since the proposed GA algorithm works only with centroids as individuals and does not hold clustered data, as in the case of K-means, when a population is created using the random.choice method, a paradox of choosing the same centroid occurs with a small number of chromosomes. The genetic algorithm was then not able to correct the errors. This paradox can be influenced by increasing the number of chromosomes in the population, possibly increasing the value of the mutation.
The error has not occurred with more than 10 chromosomes in the population. If we compare the results of both algorithms, with a small number of input values, both algorithms reached the same degree of convergence. If the results with a large number of input values are compared, GA reaches a better time of convergence, taking into account the population size and the number of repetitions that have been fixed. In the case of a P2P real test, both algorithms correctly assigned the communicating IP addresses to clusters. This was a traffic connection negotiation.

9. Conclusions

In this article, we presented the comparison and testing of k-means and genetic algorithms. These algorithms were used to search for the similarity of survival curves. The idea behind this is that a certain type of network traffic can be observed by converting it to specific traffic curves using a survival analysis method and then comparing the individual curves. Comparing curves of different network nodes—for example, in peer-to-peer repetitive behavior or ransomware generating requests in certain periodic cycles—might be useful in finding unwanted traffic.
Therefore, we decided to test algorithms capable of performing the above calculation. We were able to improve our genetic algorithm and decrease the time needed to find the solution by not calling new classes of populations through crossover and mutation. The results show that the genetic algorithm is better suited for the calculation of a larger number of survival curves. Algorithm efficiency and the tuning of individual settings, such as the population size or number of iterations, must be taken into account. Both algorithms correctly assigned the IP addresses in the test set relative to their generated traffic.
Our continuing work is focused on automatically increasing or decreasing the number of centroids to make the algorithm more effective and on parallelization. The source code is available on request.

Author Contributions

Conceptualization, V.O.; Methodology, V.O. and T.H.; Software, V.O.; Validation, T.H.; Formal Analysis, T.H.; Investigation, V.O. and T.H.; Resources, V.O. and T.H.; Data Curation, V.O.; Writing—Original Draft Preparation, V.O. and T.H.; Writing—Review & Editing, V.O.; Visualization, V.O.; Supervision, V.O.; Project Administration, V.O.; Funding Acquisition, V.O. and T.H.

Funding

The presented research was funded by a project of the Ministry of Interior grant number VI20172019072 registration and the National Sustainability Program under grant number LO1401.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
DBDavies–Bouldin
FPGAfield-programmable gate array
GAgenetic algorithm
GDPgenetic decision probe
IPinternet protocol
PCAprincipal component analysis
P2Ppeer-to-peer
SDsource to destination

References

  1. Scaife, N.; Carter, H.; Traynor, P.; Butler, K.R.B. CryptoLock (and Drop It) Stopping Ransomware Attacks on User Data. In Proceedings of the 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS), Nara, Japan, 27–30 June 2016; pp. 303–312. [Google Scholar]
  2. Oujezsky, V.; Horvath, T.; Skorpil, V. Botnet C&C Traffic and Flow Lifespans Using Survival Analysis. Int. J. Adv. Telecommun. Electrotech. Signals Syst. 2017, 6, 38–44. [Google Scholar]
  3. Davidson-Pilon, C. Lifelines. Available online: https://lifelines.readthedocs.io/en/latest/ (accessed on 8 October 2018).
  4. Caligare. What Is Netflow? Available online: http://netflow.caligare.com (accessed on 8 October 2018).
  5. Kishore, J.; Goel, M.K.; Khanna, P. Understanding survival analysis: Kaplan-Meier estimate. Int. J. Ayurveda Res. 2010, 1, 274–278. [Google Scholar] [CrossRef] [PubMed]
  6. Oujezsky, V.; Horvath, T. NetFlow Console Collector—Analyzer Developed in Python Language. In Proceedings of the International Interdisciplinary PhD Workshop 2016, Brno, Czech Republic, 12–15 September 2016; pp. 107–110. [Google Scholar]
  7. Xilinx, Virtex 7. Available online: https://www.xilinx.com/products/silicon-devices/fpga/virtex-7.html (accessed on 8 October 2018).
  8. Somvanshi, D.; Yadava, R.D.S. Boosting Principal Component Analysis by Genetic Algorithm. Def. Sci. J. 2010, 60, 392–398. [Google Scholar] [CrossRef]
  9. Rivera-Gallego, W. A genetic algorithm for solving the Euclidean distance matrices completion problem. In Proceedings of the 1999 ACM symposium on Applied computing, San Antonio, TX, USA, 28 February–2 March 1999; pp. 286–290. [Google Scholar]
  10. Chang, D.-X.; Zhang, X.-D.; Zheng, C.-W. A genetic algorithm with gene rearrangement for K-means clustering. Pattern Recognit. 2009, 42, 1210–1222. [Google Scholar] [CrossRef]
  11. Bandyopadhyay, S.; Maulik, U. An evolutionary technique based on K-Means algorithm for optimal clustering in RN. Inf. Sci. 2002, 146, 221–237. [Google Scholar] [CrossRef]
  12. Maulik, U.; Bandyopadhyay, S. Genetic algorithm-based clustering technique. Pattern Recognit. 2000, 33, 1455–1465. [Google Scholar] [CrossRef] [Green Version]
  13. Fernando, P.R.; Katkoori, S.; Keymeulen, D.; Zebulum, R.; Stoica, A. Customizable FPGA IP Core Implementation of a General-Purpose Genetic Algorithm Engine. IEEE Trans. Evol. Comput. 2010, 14, 133–149. [Google Scholar] [CrossRef]
  14. Barrett, P. Euclidean Distance—Raw, Normalized, and Double-Scaled Coefficients. Available online: http://www.pbarrett.net/techpapers/euclid.pdf (accessed on 8 October 2018).
  15. MUNI Brno. Mathematics Biology. Available online: http://portal.matematickabiologie.cz/ (accessed on 8 October 2018).
  16. Python Software Foundation, Unittest—Unit Testing Framework. Available online: https://docs.python.org/3/library/unittest.html (accessed on 8 October 2018).
  17. Scikit-Learn. Available online: http://scikit-learn.org/stable/modules/generated/sklearn.datasets.make_circles.html (accessed on 8 October 2018).
  18. Trevino, A. Introduction to K-Means Clustering. Available online: https://www.datascience.com/blog/k-means-clustering (accessed on 8 October 2018).
Figure 1. Survival curves of protocols.
Figure 1. Survival curves of protocols.
Technologies 06 00103 g001
Figure 2. Partial K-Means.py class diagram.
Figure 2. Partial K-Means.py class diagram.
Technologies 06 00103 g002
Figure 3. Partial GeneticsCore.py class diagram.
Figure 3. Partial GeneticsCore.py class diagram.
Technologies 06 00103 g003
Table 1. Gene expression matrix.
Table 1. Gene expression matrix.
 IP AddressSurvival function S ( t )
192.168.1.661.00 0.73 0.64 0.45 0.45 0.27 0.18 0.18
192.168.1.2551.00 0.42 0.42 0.28 0.14 0.14 0.07 0.00
89.176.9.2041.00 1.00 0.66 0.32 0.00 0.00 0.00 0.00
Table 2. The sum of the mean distances inside the clusters.
Table 2. The sum of the mean distances inside the clusters.
Mean Distances Inside ClustersSum
0.00.00.01.58716997118311.5871699711831
Table 3. Outputs of chromosomes from the genetic decision probe (GDP) application.
Table 3. Outputs of chromosomes from the genetic decision probe (GDP) application.
ChromosomesOutputsChromosomesOutputs
Chromosome 10.0 1.0 1000.0 0.0 0.79Chromosome 30.0 1.0 1500.0 0.0 0.50
0.0 1.0 1000.0 0.0 0.450.0 1.0 1500.0 0.0 0.37
0.0 1.0 1000.0 0.0 0.450.0 1.0 1000.0 0.0 0.45
Chromosome 20.0 1.0 1500.0 0.0 0.37Chromosome 40.0 1.0 0.0 0.0 0.00
0.0 1.0 1000.0 0.0 0.450.0 1.0 0.0 0.0 0.00
0.0 1.0 1500.0 0.0 0.370.0 1.0 1000.0 0.0 0.45
Table 4. The results of performed tests for both algorithms.
Table 4. The results of performed tests for both algorithms.
Algorithms
DatasetsK-MeansGATests
Drivers8 cycles to convergence (4m, 16s)
DB Index 0.5167630551103491
Sum: 29.107135396708152
6 cycles, population = 4 (1m, 2s)
DB Index 0.46742701779860801
Sum: 27.452260723272207
Test 1
5 cycles to convergence (1m, 59s)
DB Index 0.6928435886081372
Sum: 38.22747907985817
2 cycles, population = 4 (23s)
DB Index 0.67284260223514103
Sum: 29.601280430142346
Test 2
Cyrcles6 cycles to convergence (3s, 926ms)
DB Index 0.9987036150188133
Sum: 1.717726567997643
2 cycles, population = 4 (2s, 72ms)
DB Index 0.77739787348584977
Sum: 1.5172548869635047
Test 1
2 cycles to convergence (1s, 663ms)
DB Index 0.9133526077302941
Sum: 1.6639746612808648
2 cycles, population = 6 (4s, 49ms)
DB Index 0.97353773307594249
Sum: 1.7154716157662906
Test 2
3 cycles to convergence (2s, 2ms)
DB Index 0.8400359621183359
Sum: 1.4401091736722333
2 cycles, population = 10 (6s, 2ms)
DB Index 0.8418532846822262
Sum: 1.5331916473395522
Test 3
Table 5. The results of performed tests for the genetic algorithm (GA) with manipulations.
Table 5. The results of performed tests for the genetic algorithm (GA) with manipulations.
Genetic Algorithm
Circles
2 cycles, population = 6 (4s, 49ms)
DB Index 0.97353773307594249
Sum: 1.7154716157662906
Test 1
Cycles 2
Population 6
2 cycles, population = 10 (6s, 2ms)
DB Index 0.8418532846822262
Sum: 1.5331916473395522
Test 3
Cycles 2
Population 10
6 cycles, population = 6 (9s, 738ms)
DB Index 0.84332527741694963
Sum: 1.2663053983838712
Test 2
Cycles 6
Population 6
6 cycles, population = 10 (16s, 304ms)
DB Index 0.89134036655984594
Sum: 1.4076740115353803
Test 4
Cycles 6
Population 10
Table 6. Program output of the custom dataset.
Table 6. Program output of the custom dataset.
NIP AddressSurvival Analysis TimelineTimeline Values
089.176.9.2040110331041104900.450.781.282.28
1192.168.1.540115011509155300.370.440.510.58
279.143.185.2290100000.000.000.000.00
3192.168.1.460114971501150900.500.751.091.59
4192.168.1.660110331041104900.790.880.981.09
N + 1
Table 7. Program outputs of the final computation.
Table 7. Program outputs of the final computation.
Algorithms
DatasetK-MeansGATests
IP address2 cycles to convergence, (78ms)
DB Index 0.0016132173486533587
Sum: 0.9918338445433054
 
Near curve value, cluster 0:
79.143.185.229
Near curve value, cluster 1:
192.168.1.66
89.176.9.204
Near curve value, cluster 2:
192.168.1.54
192.168.1.46
GA, 4 cycles, population = 4 (142ms)
Distance 1. cycle: [155.33340769869454]
Distance 2. cycle: [4.218783667088422]
Distance 3. cycle: [2.211733592974675]
Distance 4. cycle: [0.9918338445433054]
DB Index 0.0016132173486533587
Sum: 0.99183384454330537

Near curve value, cluster 0:
79.143.185.229
Near curve value, cluster 1:
89.176.9.204
192.168.1.66
Near curve value, cluster 2:
192.168.1.54
192.168.1.46
Test 1

Share and Cite

MDPI and ACS Style

Oujezsky, V.; Horvath, T. Traffic Similarity Observation Using a Genetic Algorithm and Clustering. Technologies 2018, 6, 103. https://doi.org/10.3390/technologies6040103

AMA Style

Oujezsky V, Horvath T. Traffic Similarity Observation Using a Genetic Algorithm and Clustering. Technologies. 2018; 6(4):103. https://doi.org/10.3390/technologies6040103

Chicago/Turabian Style

Oujezsky, Vaclav, and Tomas Horvath. 2018. "Traffic Similarity Observation Using a Genetic Algorithm and Clustering" Technologies 6, no. 4: 103. https://doi.org/10.3390/technologies6040103

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop