Research Article
Classification of Markov Encrypted Traffic on Gaussian Mixture Model Constrained Clustering
Input: Apply fingerprint. | Step1. Set to the equivalent set according to the restriction set by the IP address of the data packet; | Step2. Calculate the average value of ; | Step3. Calculate each sample in according to , and generate a new partition ; | Step4. Recalculate the mean ; | Step5. Repeat step 3 until the sample mean change does not exceed the threshold; | Step6. Recalculate . | Output: Division of application fingerprints . |
|