Visualization of encrypted data packagesusing birch algorithm

0Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Encrypted data packagesare already widely used in public services; such as Secure Sockets Layer (SSL/Transport Layer Security (TLS) and tunneling.It is used for its advantage of providing secure data exchange. However, there are difficulties to recognize encrypted packet patterns and distinguish between safe and malicious data. This paper proposes a method to visualize encrypted data packages in graphical form using Birch algorithm where itrecognizes better.There are four stages carried out in the study, namely System Design, Feature Extraction, Cluster Process, and Visualization. The results of clustering using the birch algorithm of 0.98 or have a percentage level of accuracy of 98 percent.

Cite

CITATION STYLE

APA

Setiawan, H., Tasmi, Sanmarino, A., & Verano, D. (2019). Visualization of encrypted data packagesusing birch algorithm. International Journal of Engineering and Advanced Technology, 9(1), 3594–3597. https://doi.org/10.35940/ijeat.A2693.109119

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free