SlideShare a Scribd company logo
1 of 18
Exploiting Clustering Techniques for Web Session Inference A.Bianco, G. Mardente, M. Mellia, M.Munafò, L. Muscariello (Politecnico di Torino)
Outline ,[object Object],[object Object],[object Object],[object Object],[object Object]
Web session definition ,[object Object],think time T off think time T off ,[object Object],[object Object]
Algorithms ,[object Object],[object Object],[object Object],[object Object]
Proposed algorithm ,[object Object],[object Object],[object Object],[object Object],[object Object]
First Step: K-means ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],g - th  percentile (100- g )- th  percentile
Second step: a  hierarchical  method ,[object Object],[object Object]
Gamma function typical behaviour -10 0 10 20 30 40 50 60 70 0 200 400 600 800 1000 1200 1400 gamma Step
Third Step: K-means ,[object Object],[object Object],[object Object]
Performance evaluation  ,[object Object],[object Object],[object Object],[object Object],[object Object]
First step sensitivity (1/2) ,[object Object],[object Object],0.01 0.1 1 10 0 200 400 600 800 1000 1200 1400 1600 1800 2000 Percentage of errors T_{off} K=1000 K=1500 K=2000 K=2500
First step sensitivity (2/2) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],0.01 0.1 1 10 0 200 400 600 800 1000 1200 1400 1600 1800 2000 Percentage of errors T_{off} Single linkage Centroid Method g=1 g=5 0.01 0.1 1 10 0 200 400 600 800 1000 1200 1400 1600 1800 2000 T_{off} g=15 g=25 g=35 g=45
Comparison with threshold based algorithms – exponential case ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],0.1 1 10 0 200 400 600 800 1000 1200 1400 1600 1800 2000 Percentage of errors T_{off} clustering etha=T_{off}/2 etha=T_{off}/4 etha=T_{off}/8 0.1 1 10 0 200 400 600 800 1000 1200 1400 1600 1800 2000 T_{off} etha=T_{off}/16 etha=T_{off}/32 etha=T_{off}/64 etha=T_{off}/128
Comparison with threshold based algorithms –  Pareto  case ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],0.1 1 10 0 200 400 600 800 1000 1200 1400 1600 1800 2000 Percentage of errors T_{off} clustering etha=T_{off}/2 etha=T_{off}/4 etha=T_{off}/8 0.1 1 10 0 200 400 600 800 1000 1200 1400 1600 1800 2000 T_{off} etha=T_{off}/16 etha=T_{off}/32 etha=T_{off}/64 etha=T_{off}/128
Some statistics on  aggregated  sessions ,[object Object],[object Object],[object Object],0 0.05 0.1 0.15 0.2 0.25 0.3 1 10 100 1000 10000 PDF Number of TCP connections per session 1e-005 0.0001 0.001 0.01 0.1 1 100 1000 10000 Number of TCP connections per session Compl. CDF 0 0.01 0.02 0.03 0.04 0.05 0.06 1 10 100 PDF Session Length [s] First SYN -> Last TCP Tear-Down First SYN -> Last Data Segment 0.0001 0.001 0.01 0.1 1 100 1000 10000 Session Length [s] Compl. CDF
Some statistics on  aggregated  sessions ,[object Object],[object Object],0 0.005 0.01 0.015 0.02 0.025 0.03 100 1000 10000 100000 1e+006 PDF Session data [bytes] Server -> Client Client -> Server 1e-005 0.0001 0.001 0.01 0.1 1 10000 100000 1e+006 1e+007 Session data [bytes] Compl. CDF
Flow’s and session’s inter-arrivals ,[object Object],[object Object],0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 0.1 1 10 100 1000 10000 CDF Time [s] Apr.04 T_{off} Oct.02 T_{off} Apr.04 T_{arr} Oct.02 T_{arr}
Conclusions ,[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

Multisensor data fusion in object tracking applications
Multisensor data fusion in object tracking applicationsMultisensor data fusion in object tracking applications
Multisensor data fusion in object tracking applications
Sayed Abulhasan Quadri
 
Kalman filter - Applications in Image processing
Kalman filter - Applications in Image processingKalman filter - Applications in Image processing
Kalman filter - Applications in Image processing
Ravi Teja
 
Report kalman filtering
Report kalman filteringReport kalman filtering
Report kalman filtering
Irfan Anjum
 
Real time implementation of unscented kalman filter for target tracking
Real time implementation of unscented kalman filter for target trackingReal time implementation of unscented kalman filter for target tracking
Real time implementation of unscented kalman filter for target tracking
IAEME Publication
 
Queuing theory and traffic flow analysis
Queuing theory and traffic flow analysisQueuing theory and traffic flow analysis
Queuing theory and traffic flow analysis
Reymond Dy
 
Weighted Least Squared Approach to Fault Detection and Isolation for GPS Inte...
Weighted Least Squared Approach to Fault Detection and Isolation for GPS Inte...Weighted Least Squared Approach to Fault Detection and Isolation for GPS Inte...
Weighted Least Squared Approach to Fault Detection and Isolation for GPS Inte...
TELKOMNIKA JOURNAL
 

What's hot (20)

Kalman filter
Kalman filterKalman filter
Kalman filter
 
Multisensor data fusion in object tracking applications
Multisensor data fusion in object tracking applicationsMultisensor data fusion in object tracking applications
Multisensor data fusion in object tracking applications
 
Kalman Filter
Kalman FilterKalman Filter
Kalman Filter
 
Kalmanfilter
KalmanfilterKalmanfilter
Kalmanfilter
 
Data fusion with kalman filtering
Data fusion with kalman filteringData fusion with kalman filtering
Data fusion with kalman filtering
 
Kalman_filtering
Kalman_filteringKalman_filtering
Kalman_filtering
 
Understanding kalman filter for soc estimation.
Understanding kalman filter for soc estimation.Understanding kalman filter for soc estimation.
Understanding kalman filter for soc estimation.
 
Kalman Filter Based GPS Receiver
Kalman Filter Based GPS ReceiverKalman Filter Based GPS Receiver
Kalman Filter Based GPS Receiver
 
Kalman Equations
Kalman EquationsKalman Equations
Kalman Equations
 
kalman filtering "From Basics to unscented Kaman filter"
 kalman filtering "From Basics to unscented Kaman filter" kalman filtering "From Basics to unscented Kaman filter"
kalman filtering "From Basics to unscented Kaman filter"
 
Kalman Filter | Statistics
Kalman Filter | StatisticsKalman Filter | Statistics
Kalman Filter | Statistics
 
Kalman filter - Applications in Image processing
Kalman filter - Applications in Image processingKalman filter - Applications in Image processing
Kalman filter - Applications in Image processing
 
Report kalman filtering
Report kalman filteringReport kalman filtering
Report kalman filtering
 
Lecture 09: SLAM
Lecture 09: SLAMLecture 09: SLAM
Lecture 09: SLAM
 
Real time implementation of unscented kalman filter for target tracking
Real time implementation of unscented kalman filter for target trackingReal time implementation of unscented kalman filter for target tracking
Real time implementation of unscented kalman filter for target tracking
 
Queuing theory and traffic flow analysis
Queuing theory and traffic flow analysisQueuing theory and traffic flow analysis
Queuing theory and traffic flow analysis
 
Doppler Estimation Method of Using Frequency Channel Response for OFDM System...
Doppler Estimation Method of Using Frequency Channel Response for OFDM System...Doppler Estimation Method of Using Frequency Channel Response for OFDM System...
Doppler Estimation Method of Using Frequency Channel Response for OFDM System...
 
Kalman filter implimention in mathlab
Kalman filter  implimention in mathlabKalman filter  implimention in mathlab
Kalman filter implimention in mathlab
 
Weighted Least Squared Approach to Fault Detection and Isolation for GPS Inte...
Weighted Least Squared Approach to Fault Detection and Isolation for GPS Inte...Weighted Least Squared Approach to Fault Detection and Isolation for GPS Inte...
Weighted Least Squared Approach to Fault Detection and Isolation for GPS Inte...
 
Kalman Filtering
Kalman FilteringKalman Filtering
Kalman Filtering
 

Similar to Exploiting clustering techniques

Similar to Exploiting clustering techniques (20)

Design and experimental validation of a new bandwidth sharing scheme based on...
Design and experimental validation of a new bandwidth sharing scheme based on...Design and experimental validation of a new bandwidth sharing scheme based on...
Design and experimental validation of a new bandwidth sharing scheme based on...
 
Queue
QueueQueue
Queue
 
Fairness in Transfer Control Protocol for Congestion Control in Multiplicativ...
Fairness in Transfer Control Protocol for Congestion Control in Multiplicativ...Fairness in Transfer Control Protocol for Congestion Control in Multiplicativ...
Fairness in Transfer Control Protocol for Congestion Control in Multiplicativ...
 
ANALYSIS AND EXPERIMENTAL EVALUATION OF THE TRANSMISSION CONTROL PROTOCOL CON...
ANALYSIS AND EXPERIMENTAL EVALUATION OF THE TRANSMISSION CONTROL PROTOCOL CON...ANALYSIS AND EXPERIMENTAL EVALUATION OF THE TRANSMISSION CONTROL PROTOCOL CON...
ANALYSIS AND EXPERIMENTAL EVALUATION OF THE TRANSMISSION CONTROL PROTOCOL CON...
 
Channel quality
Channel qualityChannel quality
Channel quality
 
Making Custom Oscilloscope Measurements
Making Custom Oscilloscope MeasurementsMaking Custom Oscilloscope Measurements
Making Custom Oscilloscope Measurements
 
chapter 3.2 TCP.pptx
chapter 3.2 TCP.pptxchapter 3.2 TCP.pptx
chapter 3.2 TCP.pptx
 
2018867974 sulaim (2)
2018867974 sulaim (2)2018867974 sulaim (2)
2018867974 sulaim (2)
 
M017137072
M017137072M017137072
M017137072
 
Congestion Control: A Dynamic Approach
Congestion Control: A Dynamic ApproachCongestion Control: A Dynamic Approach
Congestion Control: A Dynamic Approach
 
Congestion Control: A Dynamic Approach
Congestion Control: A Dynamic ApproachCongestion Control: A Dynamic Approach
Congestion Control: A Dynamic Approach
 
Self-adaptive container monitoring with performance-aware Load-Shedding policies
Self-adaptive container monitoring with performance-aware Load-Shedding policiesSelf-adaptive container monitoring with performance-aware Load-Shedding policies
Self-adaptive container monitoring with performance-aware Load-Shedding policies
 
tcp congestion .pptx
tcp congestion .pptxtcp congestion .pptx
tcp congestion .pptx
 
Adaptive Traffic Sampling and Management Platform
Adaptive Traffic Sampling and Management PlatformAdaptive Traffic Sampling and Management Platform
Adaptive Traffic Sampling and Management Platform
 
Proportional-integral genetic algorithm controller for stability of TCP network
Proportional-integral genetic algorithm controller for stability of TCP network Proportional-integral genetic algorithm controller for stability of TCP network
Proportional-integral genetic algorithm controller for stability of TCP network
 
ENHANCEMENT OF TCP FAIRNESS IN IEEE 802.11 NETWORKS
ENHANCEMENT OF TCP FAIRNESS IN IEEE 802.11 NETWORKSENHANCEMENT OF TCP FAIRNESS IN IEEE 802.11 NETWORKS
ENHANCEMENT OF TCP FAIRNESS IN IEEE 802.11 NETWORKS
 
REDUCING THE MONITORING REGISTER FOR THE DETECTION OF ANOMALIES IN SOFTWARE D...
REDUCING THE MONITORING REGISTER FOR THE DETECTION OF ANOMALIES IN SOFTWARE D...REDUCING THE MONITORING REGISTER FOR THE DETECTION OF ANOMALIES IN SOFTWARE D...
REDUCING THE MONITORING REGISTER FOR THE DETECTION OF ANOMALIES IN SOFTWARE D...
 
IMPACT OF CONTENTION WINDOW ON CONGESTION CONTROL ALGORITHMS FOR WIRELESS ADH...
IMPACT OF CONTENTION WINDOW ON CONGESTION CONTROL ALGORITHMS FOR WIRELESS ADH...IMPACT OF CONTENTION WINDOW ON CONGESTION CONTROL ALGORITHMS FOR WIRELESS ADH...
IMPACT OF CONTENTION WINDOW ON CONGESTION CONTROL ALGORITHMS FOR WIRELESS ADH...
 
Automated Parameterization of Performance Models from Measurements
Automated Parameterization of Performance Models from MeasurementsAutomated Parameterization of Performance Models from Measurements
Automated Parameterization of Performance Models from Measurements
 
Design and Performance Optimization of Authentication, Authorization, and Acc...
Design and Performance Optimization of Authentication, Authorization, and Acc...Design and Performance Optimization of Authentication, Authorization, and Acc...
Design and Performance Optimization of Authentication, Authorization, and Acc...
 

Exploiting clustering techniques

  • 1. Exploiting Clustering Techniques for Web Session Inference A.Bianco, G. Mardente, M. Mellia, M.Munafò, L. Muscariello (Politecnico di Torino)
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8. Gamma function typical behaviour -10 0 10 20 30 40 50 60 70 0 200 400 600 800 1000 1200 1400 gamma Step
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.