SlideShare a Scribd company logo
1 of 7
Network Traffic Trend Prediction Using Machine
Learning Modelling of Packet Lengths
Rangaprasad Sampath (Ranga)
Madhusoodhana Chari S (Madhu)
#2 Network
Traffic Analysis
CRISP -DM
#3 Network
Traffic Feature
Engg.
#4 Data
Collection
#5 Network Traffic
Trend Prediction
#5 K-Means
Clustering
#6 Continuous
Monitoring
Network Traffic Analysis
Objective
To characterize network traffic based on
packet lengths and consequently infer and
predict network traffic trends from such
characterization.
What will this help address?
 Provide alerts when network traffic
may lead to instability.
 Detect anomalies in traffic trends.
 Provision networks to handle traffic
swings.
 Derive actionable insights.
Business
Understanding
Network Traffic Feature Engineering
Observations
• In time t, packets of 14 different lengths
constitute traffic, n.
• In time t, packets of only 4 different lengths
contribute to 80 % of traffic volume, m.
Data
Understanding
Packet length (in
bytes)
Number of
packets
Volume (in
bytes)
Contribution to
overall volume
in %
40 15 600 0.02
64 580 37120 1.61
70 300 21000 0.91
360 230 82800 3.61
420 110 46200 2.01
680 25 17000 0.74
700 90 63000 2.74
790 80 63200 2.75
840 55 46200 2.01
870 40 34800 1.51
1020 280 285600 12.45
1140 340 387600 16.89
1260 340 428400 18.67
1500 520 780000 34.00
Key Takeaway
A traffic histogram for time t is mapped to a data point (m, n) .
Experimentation and Data Collection
Methodology
• For every time interval t, note the packets that
constitute network traffic and the traffic
volume.
• Note the total number of packet lengths, n.
• Obtain the top packet lengths, m that
contribute to 80 % of network traffic volume.
• Repeat the same multiple times over time
intervals t that could span over days or weeks.
Some factors that may influence m and n
• Network topology changes
• Entry/Exit of new applications/users
• Failures in the traffic paths
Sample representative dataset
Data
Preparation
Number of packet lengths,
m, that contribute to 80% of
network traffic volume
Number of packet
lengths, n, seen
4 14
4 11
6 11
3 12
8 14
6 12
8 12
4 10
Unsupervised Machine Learning:
K-Means Clustering
Cluster Labeling
• Even – Red boundary
• Dense – Green boundary
• Rare – Blue boundary
Network Traffic Trend
Prediction
A data point’s location in a
certain cluster is indicative of the
network traffic trend at that time.
Data prior to Clustering Data post Clustering
Modelling and
Evaluation
Continuous Monitoring and Insights
Observation Inference
Day to Day network traffic trends falling largely
into the Rare cluster.
 Network is holding up and the provisioned
capacity is serving quite well.
More network traffic trends in a day are moving
into the Even from the Rare cluster.
 New applications are probably being
introduced/trialed in the deployed network.
A sudden increase in network traffic trends
moving into the Dense cluster.
 Existing security provisions in the network
need to be reviewed.
Elimination of network traffic trends in the
Dense cluster.
 Security attack mitigation measures
introduced may have succeeded.
Insights guide Capacity Planning, Anomaly Detection, Security Profiling
Deployment
Reach out to…
Rangaprasad Sampath
https://www.linkedin.com/in/rangaprasad-sampath
ranga.sampath@gmail.com
Twitter @rangas_
Madhusoodhana Chari S
https://www.linkedin.com/in/madhucharis/
madhucharis@gmail.com

More Related Content

What's hot

Weapon detection using artificial intelligence and deep learning for security...
Weapon detection using artificial intelligence and deep learning for security...Weapon detection using artificial intelligence and deep learning for security...
Weapon detection using artificial intelligence and deep learning for security...Venkat Projects
 
Vehicle tracking Using GPS,GSM & ARM7
Vehicle tracking Using GPS,GSM & ARM7Vehicle tracking Using GPS,GSM & ARM7
Vehicle tracking Using GPS,GSM & ARM7Ashutosh Upadhayay
 
Intelligent wireless video monitoring system using computer111111
Intelligent wireless video monitoring system using computer111111Intelligent wireless video monitoring system using computer111111
Intelligent wireless video monitoring system using computer111111venkatesh deekonda
 
Inter vehicle communication
Inter vehicle communicationInter vehicle communication
Inter vehicle communicationR prasad
 
Wireless sensor network for traffic control
Wireless sensor network for traffic controlWireless sensor network for traffic control
Wireless sensor network for traffic controlImran Khan
 
Using Deep Learning and Transfer Learning for Pneumonia Detection
Using Deep Learning and Transfer Learning for Pneumonia DetectionUsing Deep Learning and Transfer Learning for Pneumonia Detection
Using Deep Learning and Transfer Learning for Pneumonia DetectionIRJET Journal
 
Driver drowsiness detection
Driver drowsiness detectionDriver drowsiness detection
Driver drowsiness detectionConnecting Point
 
Global Wireless E-Voting Documentation
Global Wireless E-Voting DocumentationGlobal Wireless E-Voting Documentation
Global Wireless E-Voting DocumentationCharan Reddy Mutyala
 
VTU Syllabus - 2010 Scheme (III to VIII Semester)
VTU Syllabus - 2010 Scheme (III to VIII Semester)VTU Syllabus - 2010 Scheme (III to VIII Semester)
VTU Syllabus - 2010 Scheme (III to VIII Semester)Ravikiran A
 
Secure e voting system
Secure e voting systemSecure e voting system
Secure e voting systemMonira Monir
 
Crime Analysis & Prediction System
Crime Analysis & Prediction SystemCrime Analysis & Prediction System
Crime Analysis & Prediction SystemBigDataCloud
 
Global wireless e-voting
Global wireless e-votingGlobal wireless e-voting
Global wireless e-votingashujain55
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)ArunChokkalingam
 
Driver Drowsiness Detection Review
Driver Drowsiness Detection ReviewDriver Drowsiness Detection Review
Driver Drowsiness Detection ReviewAsaad Waqar
 
Three Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationThree Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationBro Jayaram
 
Automatic chocolate vending machine using mucos rtos ppt
Automatic chocolate vending machine using mucos rtos pptAutomatic chocolate vending machine using mucos rtos ppt
Automatic chocolate vending machine using mucos rtos pptJOLLUSUDARSHANREDDY
 
Predicting students performance in final examination
Predicting students performance in final examinationPredicting students performance in final examination
Predicting students performance in final examinationRashid Ansari
 

What's hot (20)

Weapon detection using artificial intelligence and deep learning for security...
Weapon detection using artificial intelligence and deep learning for security...Weapon detection using artificial intelligence and deep learning for security...
Weapon detection using artificial intelligence and deep learning for security...
 
Vehicle tracking Using GPS,GSM & ARM7
Vehicle tracking Using GPS,GSM & ARM7Vehicle tracking Using GPS,GSM & ARM7
Vehicle tracking Using GPS,GSM & ARM7
 
Intelligent wireless video monitoring system using computer111111
Intelligent wireless video monitoring system using computer111111Intelligent wireless video monitoring system using computer111111
Intelligent wireless video monitoring system using computer111111
 
Best Paper winning PPT
Best Paper winning PPTBest Paper winning PPT
Best Paper winning PPT
 
Inter vehicle communication
Inter vehicle communicationInter vehicle communication
Inter vehicle communication
 
Wireless sensor network for traffic control
Wireless sensor network for traffic controlWireless sensor network for traffic control
Wireless sensor network for traffic control
 
Using Deep Learning and Transfer Learning for Pneumonia Detection
Using Deep Learning and Transfer Learning for Pneumonia DetectionUsing Deep Learning and Transfer Learning for Pneumonia Detection
Using Deep Learning and Transfer Learning for Pneumonia Detection
 
Driver drowsiness detection
Driver drowsiness detectionDriver drowsiness detection
Driver drowsiness detection
 
Global Wireless E-Voting Documentation
Global Wireless E-Voting DocumentationGlobal Wireless E-Voting Documentation
Global Wireless E-Voting Documentation
 
VTU Syllabus - 2010 Scheme (III to VIII Semester)
VTU Syllabus - 2010 Scheme (III to VIII Semester)VTU Syllabus - 2010 Scheme (III to VIII Semester)
VTU Syllabus - 2010 Scheme (III to VIII Semester)
 
Secure e voting system
Secure e voting systemSecure e voting system
Secure e voting system
 
Crime Analysis & Prediction System
Crime Analysis & Prediction SystemCrime Analysis & Prediction System
Crime Analysis & Prediction System
 
Global wireless e-voting
Global wireless e-votingGlobal wireless e-voting
Global wireless e-voting
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)
 
Driver Drowsiness Detection Review
Driver Drowsiness Detection ReviewDriver Drowsiness Detection Review
Driver Drowsiness Detection Review
 
PPT.pptx
PPT.pptxPPT.pptx
PPT.pptx
 
Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)
 
Three Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationThree Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based Aunthentication
 
Automatic chocolate vending machine using mucos rtos ppt
Automatic chocolate vending machine using mucos rtos pptAutomatic chocolate vending machine using mucos rtos ppt
Automatic chocolate vending machine using mucos rtos ppt
 
Predicting students performance in final examination
Predicting students performance in final examinationPredicting students performance in final examination
Predicting students performance in final examination
 

Similar to Network Traffic Trends Prediction Using Machine Learning Modelling of Packet Lengths

Proposal for System Analysis and Desing
Proposal for System Analysis and DesingProposal for System Analysis and Desing
Proposal for System Analysis and DesingMd Khaza Main Uddin
 
G03403041052
G03403041052G03403041052
G03403041052theijes
 
Route Stability Prediction Using Machine Learning Modelling of Route Table Fe...
Route Stability Prediction Using Machine Learning Modelling of Route Table Fe...Route Stability Prediction Using Machine Learning Modelling of Route Table Fe...
Route Stability Prediction Using Machine Learning Modelling of Route Table Fe...Rangaprasad Sampath
 
A Review on Traffic Classification Methods in WSN
A Review on Traffic Classification Methods in WSNA Review on Traffic Classification Methods in WSN
A Review on Traffic Classification Methods in WSNIJARIIT
 
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficOnline stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficeSAT Journals
 
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficOnline stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficeSAT Publishing House
 
Internet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detectionInternet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detectionGyan Prakash
 
Building Accurate Traffic Matrices with Demand Deduction (White Paper)
Building Accurate Traffic Matrices with Demand Deduction (White Paper)Building Accurate Traffic Matrices with Demand Deduction (White Paper)
Building Accurate Traffic Matrices with Demand Deduction (White Paper)Cisco Service Provider Mobility
 
Approximation of regression-based fault minimization for network traffic
Approximation of regression-based fault minimization for network trafficApproximation of regression-based fault minimization for network traffic
Approximation of regression-based fault minimization for network trafficTELKOMNIKA JOURNAL
 
Ijarcet vol-2-issue-3-875-880
Ijarcet vol-2-issue-3-875-880Ijarcet vol-2-issue-3-875-880
Ijarcet vol-2-issue-3-875-880Editor IJARCET
 
Network Traffic Anomaly Detection Through Bayes Net
Network Traffic Anomaly Detection Through Bayes NetNetwork Traffic Anomaly Detection Through Bayes Net
Network Traffic Anomaly Detection Through Bayes NetGyan Prakash
 
Maximizing Efficiency Of multiple–Path Source Routing in Presence of Jammer
Maximizing Efficiency Of multiple–Path Source Routing in Presence of JammerMaximizing Efficiency Of multiple–Path Source Routing in Presence of Jammer
Maximizing Efficiency Of multiple–Path Source Routing in Presence of JammerIOSR Journals
 
Data Prevention from Network Hacking
Data Prevention from Network HackingData Prevention from Network Hacking
Data Prevention from Network Hackingijtsrd
 
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...IJCSIS Research Publications
 
Paper id 28201444
Paper id 28201444Paper id 28201444
Paper id 28201444IJRAT
 
Congestion control in packet switched wide area networks using a feedback model
Congestion control in packet switched wide area networks using a feedback modelCongestion control in packet switched wide area networks using a feedback model
Congestion control in packet switched wide area networks using a feedback modelijcses
 
ISSUES RELATED TO SAMPLING TECHNIQUES FOR NETWORK TRAFFIC DATASET
ISSUES RELATED TO SAMPLING TECHNIQUES FOR NETWORK TRAFFIC DATASETISSUES RELATED TO SAMPLING TECHNIQUES FOR NETWORK TRAFFIC DATASET
ISSUES RELATED TO SAMPLING TECHNIQUES FOR NETWORK TRAFFIC DATASETijmnct
 
Grid Network Services, Draft-ggf-ghpn-netservices-1.0
Grid Network Services, Draft-ggf-ghpn-netservices-1.0Grid Network Services, Draft-ggf-ghpn-netservices-1.0
Grid Network Services, Draft-ggf-ghpn-netservices-1.0Tal Lavian Ph.D.
 

Similar to Network Traffic Trends Prediction Using Machine Learning Modelling of Packet Lengths (20)

Proposal for System Analysis and Desing
Proposal for System Analysis and DesingProposal for System Analysis and Desing
Proposal for System Analysis and Desing
 
G03403041052
G03403041052G03403041052
G03403041052
 
Route Stability Prediction Using Machine Learning Modelling of Route Table Fe...
Route Stability Prediction Using Machine Learning Modelling of Route Table Fe...Route Stability Prediction Using Machine Learning Modelling of Route Table Fe...
Route Stability Prediction Using Machine Learning Modelling of Route Table Fe...
 
A Review on Traffic Classification Methods in WSN
A Review on Traffic Classification Methods in WSNA Review on Traffic Classification Methods in WSN
A Review on Traffic Classification Methods in WSN
 
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficOnline stream mining approach for clustering network traffic
Online stream mining approach for clustering network traffic
 
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficOnline stream mining approach for clustering network traffic
Online stream mining approach for clustering network traffic
 
Internet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detectionInternet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detection
 
Building Accurate Traffic Matrices with Demand Deduction (White Paper)
Building Accurate Traffic Matrices with Demand Deduction (White Paper)Building Accurate Traffic Matrices with Demand Deduction (White Paper)
Building Accurate Traffic Matrices with Demand Deduction (White Paper)
 
Approximation of regression-based fault minimization for network traffic
Approximation of regression-based fault minimization for network trafficApproximation of regression-based fault minimization for network traffic
Approximation of regression-based fault minimization for network traffic
 
Ijet v5 i6p10
Ijet v5 i6p10Ijet v5 i6p10
Ijet v5 i6p10
 
Ijarcet vol-2-issue-3-875-880
Ijarcet vol-2-issue-3-875-880Ijarcet vol-2-issue-3-875-880
Ijarcet vol-2-issue-3-875-880
 
Network Traffic Anomaly Detection Through Bayes Net
Network Traffic Anomaly Detection Through Bayes NetNetwork Traffic Anomaly Detection Through Bayes Net
Network Traffic Anomaly Detection Through Bayes Net
 
Maximizing Efficiency Of multiple–Path Source Routing in Presence of Jammer
Maximizing Efficiency Of multiple–Path Source Routing in Presence of JammerMaximizing Efficiency Of multiple–Path Source Routing in Presence of Jammer
Maximizing Efficiency Of multiple–Path Source Routing in Presence of Jammer
 
Data Prevention from Network Hacking
Data Prevention from Network HackingData Prevention from Network Hacking
Data Prevention from Network Hacking
 
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
 
Paper id 28201444
Paper id 28201444Paper id 28201444
Paper id 28201444
 
Congestion control in packet switched wide area networks using a feedback model
Congestion control in packet switched wide area networks using a feedback modelCongestion control in packet switched wide area networks using a feedback model
Congestion control in packet switched wide area networks using a feedback model
 
ISSUES RELATED TO SAMPLING TECHNIQUES FOR NETWORK TRAFFIC DATASET
ISSUES RELATED TO SAMPLING TECHNIQUES FOR NETWORK TRAFFIC DATASETISSUES RELATED TO SAMPLING TECHNIQUES FOR NETWORK TRAFFIC DATASET
ISSUES RELATED TO SAMPLING TECHNIQUES FOR NETWORK TRAFFIC DATASET
 
Grid Network Services, Draft-ggf-ghpn-netservices-1.0
Grid Network Services, Draft-ggf-ghpn-netservices-1.0Grid Network Services, Draft-ggf-ghpn-netservices-1.0
Grid Network Services, Draft-ggf-ghpn-netservices-1.0
 
A340105
A340105A340105
A340105
 

Recently uploaded

Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...amitlee9823
 
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...amitlee9823
 
ALSO dropshipping via API with DroFx.pptx
ALSO dropshipping via API with DroFx.pptxALSO dropshipping via API with DroFx.pptx
ALSO dropshipping via API with DroFx.pptxolyaivanovalion
 
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightCheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightDelhi Call girls
 
Edukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxEdukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxolyaivanovalion
 
ELKO dropshipping via API with DroFx.pptx
ELKO dropshipping via API with DroFx.pptxELKO dropshipping via API with DroFx.pptx
ELKO dropshipping via API with DroFx.pptxolyaivanovalion
 
Generative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusGenerative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusTimothy Spann
 
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...amitlee9823
 
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Delhi Call girls
 
Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxolyaivanovalion
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxolyaivanovalion
 
Accredited-Transport-Cooperatives-Jan-2021-Web.pdf
Accredited-Transport-Cooperatives-Jan-2021-Web.pdfAccredited-Transport-Cooperatives-Jan-2021-Web.pdf
Accredited-Transport-Cooperatives-Jan-2021-Web.pdfadriantubila
 
Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxolyaivanovalion
 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxolyaivanovalion
 
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...amitlee9823
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfMarinCaroMartnezBerg
 

Recently uploaded (20)

Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get CytotecAbortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
 
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
 
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
 
ALSO dropshipping via API with DroFx.pptx
ALSO dropshipping via API with DroFx.pptxALSO dropshipping via API with DroFx.pptx
ALSO dropshipping via API with DroFx.pptx
 
Sampling (random) method and Non random.ppt
Sampling (random) method and Non random.pptSampling (random) method and Non random.ppt
Sampling (random) method and Non random.ppt
 
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightCheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
 
Edukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxEdukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFx
 
ELKO dropshipping via API with DroFx.pptx
ELKO dropshipping via API with DroFx.pptxELKO dropshipping via API with DroFx.pptx
ELKO dropshipping via API with DroFx.pptx
 
Anomaly detection and data imputation within time series
Anomaly detection and data imputation within time seriesAnomaly detection and data imputation within time series
Anomaly detection and data imputation within time series
 
Generative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusGenerative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and Milvus
 
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
 
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
 
Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFx
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptx
 
Accredited-Transport-Cooperatives-Jan-2021-Web.pdf
Accredited-Transport-Cooperatives-Jan-2021-Web.pdfAccredited-Transport-Cooperatives-Jan-2021-Web.pdf
Accredited-Transport-Cooperatives-Jan-2021-Web.pdf
 
Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptx
 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptx
 
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdf
 

Network Traffic Trends Prediction Using Machine Learning Modelling of Packet Lengths

  • 1. Network Traffic Trend Prediction Using Machine Learning Modelling of Packet Lengths Rangaprasad Sampath (Ranga) Madhusoodhana Chari S (Madhu) #2 Network Traffic Analysis CRISP -DM #3 Network Traffic Feature Engg. #4 Data Collection #5 Network Traffic Trend Prediction #5 K-Means Clustering #6 Continuous Monitoring
  • 2. Network Traffic Analysis Objective To characterize network traffic based on packet lengths and consequently infer and predict network traffic trends from such characterization. What will this help address?  Provide alerts when network traffic may lead to instability.  Detect anomalies in traffic trends.  Provision networks to handle traffic swings.  Derive actionable insights. Business Understanding
  • 3. Network Traffic Feature Engineering Observations • In time t, packets of 14 different lengths constitute traffic, n. • In time t, packets of only 4 different lengths contribute to 80 % of traffic volume, m. Data Understanding Packet length (in bytes) Number of packets Volume (in bytes) Contribution to overall volume in % 40 15 600 0.02 64 580 37120 1.61 70 300 21000 0.91 360 230 82800 3.61 420 110 46200 2.01 680 25 17000 0.74 700 90 63000 2.74 790 80 63200 2.75 840 55 46200 2.01 870 40 34800 1.51 1020 280 285600 12.45 1140 340 387600 16.89 1260 340 428400 18.67 1500 520 780000 34.00 Key Takeaway A traffic histogram for time t is mapped to a data point (m, n) .
  • 4. Experimentation and Data Collection Methodology • For every time interval t, note the packets that constitute network traffic and the traffic volume. • Note the total number of packet lengths, n. • Obtain the top packet lengths, m that contribute to 80 % of network traffic volume. • Repeat the same multiple times over time intervals t that could span over days or weeks. Some factors that may influence m and n • Network topology changes • Entry/Exit of new applications/users • Failures in the traffic paths Sample representative dataset Data Preparation Number of packet lengths, m, that contribute to 80% of network traffic volume Number of packet lengths, n, seen 4 14 4 11 6 11 3 12 8 14 6 12 8 12 4 10
  • 5. Unsupervised Machine Learning: K-Means Clustering Cluster Labeling • Even – Red boundary • Dense – Green boundary • Rare – Blue boundary Network Traffic Trend Prediction A data point’s location in a certain cluster is indicative of the network traffic trend at that time. Data prior to Clustering Data post Clustering Modelling and Evaluation
  • 6. Continuous Monitoring and Insights Observation Inference Day to Day network traffic trends falling largely into the Rare cluster.  Network is holding up and the provisioned capacity is serving quite well. More network traffic trends in a day are moving into the Even from the Rare cluster.  New applications are probably being introduced/trialed in the deployed network. A sudden increase in network traffic trends moving into the Dense cluster.  Existing security provisions in the network need to be reviewed. Elimination of network traffic trends in the Dense cluster.  Security attack mitigation measures introduced may have succeeded. Insights guide Capacity Planning, Anomaly Detection, Security Profiling Deployment
  • 7. Reach out to… Rangaprasad Sampath https://www.linkedin.com/in/rangaprasad-sampath ranga.sampath@gmail.com Twitter @rangas_ Madhusoodhana Chari S https://www.linkedin.com/in/madhucharis/ madhucharis@gmail.com