Challenges in the analysis of online social networks: A data collection tool perspective

A Goswami, A Kumar - Wireless Personal Communications, 2017 - Springer
The present era of internet has radically changed the way people communicate with each
other. Online Social Network platforms have enhanced this to real-time communication …

Multi-level anomaly detection: Relevance of big data analytics in networks

SY Sait, A Bhandari, S Khare, C James, HA Murthy - Sadhana, 2015 - Springer
The Internet has become a vital source of information; internal and external attacks threaten
the integrity of the LAN connected to the Internet. In this work, several techniques have been …

Web data mining trends and techniques

UM Patil, JB Patil - Proceedings of the International Conference on …, 2012 - dl.acm.org
Web Services and Web-based applications are growing at an exponential rate. This is
generating a huge amount of Web data having its own peculiar characteristics. This in turn …

[PDF][PDF] A survey on user behaviour analysis in social networks

K Das, SK Sinha - International Journal of Computer Science and …, 2016 - academia.edu
There are some studies on social network user behaviour in literature. Yet it needs more
investigations by research communities to address various challenges in accurate analysis …

Url classification using non negative matrix factorization

S Khare, A Bhandari, HA Murthy - 2014 Twentieth National …, 2014 - ieeexplore.ieee.org
Internet availability on a campus is not metered. Internet link bandwidths are vulnerable as
they can be misused. Moreover, websites blacklist campuses for misuse. Especially …

Unusual internet traffic detection at network edge

N Bansal, R Kaushal - 2015 International Conference on …, 2015 - ieeexplore.ieee.org
Network administrators ensure that all the users within network get fair share of bandwidth,
any bandwidth limit violations is identified and provide some additional controls like denied …

[PDF][PDF] High quality design and methodology aspects to enhance large scale web services

SB Patil, S Chavan, P Patil - … Journal of Advances in Engineering & …, 2012 - Citeseer
Network traffic has increased tremendously due to the rise in the number of Internet users.
This has affected several aspects and characteristics of large scale networks such as …

User traffic classification for proxy-server based internet access control

SY Sait, MS Kumar, HA Murthy - 2012 6th International …, 2012 - ieeexplore.ieee.org
In a LAN, Internet access should be managed well for a better user experience. Those using
a larger share of the bandwidth may be restricted during peak hours to enable others to use …

Analysis and classification of web proxy logs based on patterns of traffic rates

N Kiatkumjounwong, S Ngamsuriyaroj… - TENCON 2014-2014 …, 2014 - ieeexplore.ieee.org
Logs are typically used for performing post mortem for abnormal activities. Most Internet
service providers keep the history of users' web accesses in terms of proxy logs for …

The Development of the Education Related Multimedia Whitelist Filter using Cache Proxy Log Analysis

B Indrawan, Y Kerlooza - IOP Conference Series: Materials …, 2018 - iopscience.iop.org
The purpose of this study was to show the development of the education related multimedia
whitelist filter using cache proxy log analysis. Regulation of bandwidth utilization should be …