Application Communities Detection in Network
Abstract
:1. Introduction
- It uses the <IP, Port> two-tuple as a communication node to describe communication relations. Thus it can identify the roles (server nodes or client nodes) of nodes more accurately, which benefits the measurement and analysis of the entire application traffic mode of interaction.
- It combines communication topological relationship and traffic behavior clustering to obtain more accurate community identification results. For example, we will find IP nodes that carry multiple services simultaneously and distinguish between normal users and malicious users who are accessing a service port on the same host.
2. Related Work
3. Application Community
3.1. Application Community Definition
- There is a group of service nodes and other member nodes have communication relations to these service nodes;
- When the member nodes communicate with service nodes, the characteristics of data transmission modes are similar.
3.2. Application Community Detection Method
3.2.1. Network Topological Partitioning Based on Communication Relationship
- The server node and client node can be accurately distinguished. When a client communicates with a server, it usually uses multiple ports and the server usually only uses a fixed port. This difference in ports allows the server nodes to have a large degree of power, so that the identity of a node can be clearly identified. Even if an IP accesses multiple servers at the same time, the phenomenon that the server nodes have a large degree of power will not change.
- It can be identified that the same IP bears multiple services. The same IP will open different ports for different services, so the <IP, Port> two-tuple as a node can split a server IP into multiple topology nodes according to different ports. Each node corresponds to a service provided by the server IP. A client node’s access to various services can also be easily identified.
Algorithm 1 Network Relationship Division |
Input: list of nodes Output: list of partition numbers to which the node belongs Initialize all element values in C to −1, c = 0 For i in nodes: If C[i] ! = −1: continue End If calculate Pi and Qi If |Pi| + |Qi| > 2 and |Pi| > |Qi|: C[i] = c For each j in Pi: C[j] = c End For c += 1 End If End For return C |
3.2.2. Node Clustering Based on Traffic Behavior
- Increasing the number of sample scan avoid the influence of outlier traffic flows on the results of community partitioning, which can reflect the data transmission behavior between a pair of IPs in more detail.
- After clustering, the number of instances used for clustering is greatly reduced, reducing the time for clustering calculations.
- Number of nonrepeating ports used by the source IP.
- Number of nonrepeating ports used by the destination IP.
- Average value of the protocol number.
- Minimum number of up flow packets.
- Median number of up flow packets.
- Maximum number of up flow packets.
- Minimum number of down flow packets.
- Median number of down flow packets.
- Maximum number of down flow packets.
- Minimum average packet length for up flow.
- Average median packet length for up flow.
- Maximum of average up flow packet length.
- Minimum of average down flow packet length.
- Median of average down flow packet length.
- Maximum of average down flow packet length.
4. Experimental Results
4.1. Datasets
4.2. Experimental Results
4.2.1. Modularity
4.2.2. Community Division Results
5. Analysis of Discussion
5.1. Normal and Abnormal Access on the Same Service Port
5.2. Single-IP Bearing Multiservice
5.3. P2P Communication Community
6. Conclusions
Author Contributions
Funding
Acknowledgments
Conflicts of Interest
References
- Guan, Z.; Li, J.; Wu, L.; Zhang, Y.; Wu, J.; Du, X. Achieving Efficient and Secure Data Acquisition for Cloud-supported Internet of Things in Smart Grid. IEEE Internet Things J. 2017, 4, 1934–1944. [Google Scholar] [CrossRef]
- Du, X.; Guizani, M.; Xiao, Y.; Chen, H.H. Transactions papers A Routing-Driven Elliptic Curve Cryptography based Key Management Scheme for Heterogeneous Sensor Networks. IEEE Trans. Wirel. Commun. 2009, 8, 1223–1229. [Google Scholar] [CrossRef]
- Xiao, Y.; Du, X.; Zhang, J.; Guizani, S. Internet Protocol Television (IPTV): the Killer Application for the Next Generation Internet. IEEE Commun. Mag. 2007, 45, 126–134. [Google Scholar] [CrossRef]
- Du, X.; Xiao, Y.; Guizani, M.; Chen, H.H. An Effective Key Management Scheme for Heterogeneous Sensor Networks. Ad Hoc Netw. 2007, 5, 24–34. [Google Scholar] [CrossRef]
- Baker, T.; Mackay, M.; Shaheed, A.; Aldawsari, B. Security-Oriented Cloud Platform for SOA-Based SCADA. In Proceedings of the 2015 15th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, Shenzhen, China, 4–7 May 2015. [Google Scholar]
- Karam, Y.; Baker, T.; Talebbendiab, A. Security support for intention driven elastic cloud computing. In Proceedings of the Uksim/Amss European Symposium on Computer Modeling & Simulation, Manchester, UK, 20–22 November 2013. [Google Scholar]
- Braem, B.; Barz, C.; Barz, C.; Rogge, H.; Freitag, F.; Navarro, L.; Bonicioli, J.; Papathanasiou, S.; Escrich, P.; Viñas, R.B.; et al. A Case for Research with and on Community Networks. ACM SIGCOMM Comput. Commun. Rev. 2013, 43, 68–73. [Google Scholar] [CrossRef]
- Jin, Y.; Duffield, N.; Haffner, P.; Sen, S.; Zhang, Z.-L. Can’t see forest through the trees? Understanding mixed network traffic graphs from application class distribution. In Proceedings of the 9th Workshop on Mining and Learning with Graphs (MLG2011), San Diego, CA, USA, 20–21 August 2011. [Google Scholar]
- Cai, J.; Liu, W.X. A new Method of detecting network traffic anomalies. In Applied Mechanics and Materials; Trans Tech Publications Ltd.: Dürnten, Switzerland, 2013. [Google Scholar]
- Chen, Z.; Hendrix, W.; Samatova, N.F. Community-based anomaly detection in evolutionary networks. J. Intell. Inf. Syst. 2012, 39, 59–85. [Google Scholar] [CrossRef]
- Xu, K.; Wang, F.; Gu, L. Behavior Analysis of Internet Traffic via Bipartite Graphs and One-Mode Projections. IEEE/ACM Trans. Netw. 2014, 22, 931–942. [Google Scholar] [CrossRef]
- Ni, J.; Weng, W.; Chen, J.; Lei, K. Internet Traffic Analysis Using Community Detection and Apache Spark. In Proceedings of the 2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (Cyber C), Nanjing, China, 12–14 October 2017. [Google Scholar]
- Wang, J.; Paschalidis, I.C. Botnet detection using social graph analysis. In Proceedings of the 2014 52nd Annual Allerton Conference on Communication, Control, and Computing (Allerton), Monticello, IL, USA, 30 September–3 October 2014. [Google Scholar]
- Wang, J.; Paschalidis, I.C. Botnet detection based on anomaly and community detection. IEEE Trans. Control Netw. Syst. 2017, 4, 392–404. [Google Scholar] [CrossRef]
- Jakalan, A.; Gong, J.; Weiwei, Z.; Su, Q. Clustering and profiling ip hosts based on traffic behavior. J. Netw. 2015, 10, 99. [Google Scholar] [CrossRef]
- Newman, M.E. Modularity and community structure in networks. Proc. Natl. Acad. Sci. USA 2006, 103, 8577–8582. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Guo, B.; Yu, Z.; Zhou, X.; Zhang, D. Opportunistic iot: Exploring the social side of the internet of things. In Proceedings of the 2012 IEEE 16th International Conference on Computer Supported Cooperative Work in Design (CSCWD), Wuhan, China, 23–25 May 2012; pp. 925–929. [Google Scholar]
- Aiello, W.; Kalmanek, C.; McDaniel, P.; Sen, S.; Spatscheck, O.; Van der Merwe, J. Analysis of communities of interest in data networks. In International Workshop on Passive and Active Network Measurement; Springer: Berlin, Germany, 2005. [Google Scholar]
- Jakalan, A.; Gong, J.; Su, Q.; Hu, H. Community Detection in large-scale IP networks by Observing Traffic at Network Boundary. In Proceedings of the World Congress on Engineering and Computer Science, San Francisco, CA, USA, 19–21 October 2015. [Google Scholar]
- Jakalan, A.; Gong, J.; Su, Q.; Hu, X.; Abdelgder, A.M.S. Social relationship discovery of IP addresses in the managed IP networks by observing traffic at network boundary. Comput. Netw. 2016, 100, 12–27. [Google Scholar] [CrossRef]
- Xu, K.; Wang, F.; Gu, L. Network-aware behavior clustering of Internet end hosts. In Proceedings of the INFOCOM, Shanghai, China, 10–15 April 2011. [Google Scholar]
- Dewaele, G.; Himura, Y.; Borgnat, P.; Fukuda, K.; Abry, P.; Michel, O.; Fontugne, R.; Cho, K.; Esaki, H. Unsupervised host behavior classification from connection patterns. Int. J. Netw. Manag. 2010, 20, 317–337. [Google Scholar] [CrossRef]
- Iliofotou, M.; Gallagher, B.; Eliassi-Rad, T.; Xie, G.; Faloutsos, M. Profiling-by-Association: A resilient traffic profiling solution for the internet backbone. In Proceedings of the 6th International Conference, Philadelphia, PA, USA, 30 November–3 December 2010. [Google Scholar]
- Wei, S.; Mirkovic, J.; Kissel, E. Profiling and Clustering Internet Hosts. DMIN 2006, 6, 269–275. [Google Scholar]
- Terzi, D.S.; Terzi, R.; Sagiroglu, S. Big data analytics for network anomaly detection from netflow data. In Proceedings of the 2017 International Conference on Computer Science and Engineering (UBMK), Antalya, Turkey, 5–7 October 2017. [Google Scholar]
- Shadi, K.; Natarajan, P.; Dovrolis, C. Hierarchical IP flow clustering. In Proceedings of the Workshop on Big Data Analytics and Machine Learning for Data Communication Networks, Los Angeles, CA, USA, 21 August 2017. [Google Scholar]
- Kumar, K.M.; Reddy, A.R.M. A fast DBSCAN clustering algorithm by accelerating neighbor searching using Groups method. Pattern Recognit. 2016, 58, 39–48. [Google Scholar] [CrossRef]
- Baker, T.; García-Campos, J.M.; Reina, D.G.; Toral, S.; Tawfik, H.; Al-Jumeily, D.; Hussain, A. GreeAODV: An Energy Efficient Routing Protocol for Vehicular Ad Hoc Networks; Springer: Cham, Switzerland, 2018; pp. 670–681. [Google Scholar]
- Shannon, P.; Markiel, A.; Ozier, O.; Baliga, N.S.; Wang, J.T.; Ramage, D.; Amin, N.; Schwikowski, B.; Ideker, T. Cytoscape: A software environment for integrated models of biomolecular interaction networks. Genome Res. 2003, 13, 2498–2504. [Google Scholar] [CrossRef] [PubMed]
1 | {2, 3, 4, 5, 6, 7} | {8} |
2 | {1, 8} | {3, 4, 5, 6, 7} |
3 | {1, 8} | {2, 4, 5, 6, 7} |
4 | {1} | {2, 3, 5, 6, 7} |
5 | {1} | {2, 3, 4, 6, 7} |
6 | {1} | {2, 3, 4, 5, 7} |
7 | {1} | {2, 3, 4, 5, 6} |
8 | {2, 3} | {1} |
Total Number of Nodes | |||
---|---|---|---|
Server nodes | 5006 | 318 | 5324 |
Client nodes | 2122 | 154,789 | 156,911 |
© 2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Zhang, S.; Qiu, Y.; Luo, H.; Wu, Z. Application Communities Detection in Network. Appl. Sci. 2019, 9, 31. https://doi.org/10.3390/app9010031
Zhang S, Qiu Y, Luo H, Wu Z. Application Communities Detection in Network. Applied Sciences. 2019; 9(1):31. https://doi.org/10.3390/app9010031
Chicago/Turabian StyleZhang, Shuzhuang, Yingjun Qiu, Hao Luo, and Zhigang Wu. 2019. "Application Communities Detection in Network" Applied Sciences 9, no. 1: 31. https://doi.org/10.3390/app9010031
APA StyleZhang, S., Qiu, Y., Luo, H., & Wu, Z. (2019). Application Communities Detection in Network. Applied Sciences, 9(1), 31. https://doi.org/10.3390/app9010031