Security and Communication Networks / 2020 / Article / Tab 3

Research Article

Preprocessing Method for Encrypted Traffic Based on Semisupervised Clustering

Table 3

Comparison of the clustering results of the four clustering algorithms.

Clustering algorithmTesting samplesLabeled benign samplesLabeled malicious samplesFeatures in BFS
BenignMaliciousBenignMaliciousBenignMalicious

K-means733596795202027882
DBSCAN1811488920493027825
GMM411523852296812914993
UPGMA266980297027839