Role Classification of Hosts within Enterprise Networks Based on Connection Patterns

PDF Viewer

BUILDER'S SANDBOX

Build This Paper

Use an AI coding agent to implement this research.

OpenAI Codex
OpenAI CodexAI Agent

Lightweight coding agent in your terminal.

Claude Code
Claude CodeAI Agent

Agentic coding tool for terminal workflows.

AntiGravity IDE
AntiGravity IDEScaffolding

AI agent mindset installer and workflow scaffolder.

Cursor
CursorIDE

AI-first code editor built on VS Code.

VS Code
VS CodeIDE

Free, open-source editor by Microsoft.

Estimated $10K - $14K over 6-10 weeks.

See exactly what it costs to build this -- with 3 comparable funded startups.

7-day free trial. Cancel anytime.

Discover the researchers behind this paper and find similar experts.

7-day free trial. Cancel anytime.

References (18)

[1]
Firewalls and Internet Security: Repelling the Wily Hacker
2003W. Cheswick, S. Bellovin et al.
[2]
On Clustering Validation Techniques
2001M. Halkidi, Yannis Batistakis et al.
[3]
The architecture of CoralReef: an Internet traffic monitoring software suite
2001K. Keys, D. Moore et al.
[4]
FlowScan: A Network Traffic Flow Reporting and Visualization Tool
2000D. Plonka
[5]
An end-to-end approach to host mobility
2000A. Snoeren, Hari Balakrishnan
[6]
Pandora: A Flexible Network Monitoring Platform
2000Simon Patarin, M. Makpangou
[7]
Mapping and Visualizing the Internet
2000B. Cheswick, H. Burch et al.
[8]
The Click modular router
1999E. Kohler, R. Morris et al.
[9]
Data clustering: a review
1999Anil K. Jain, M. Murty et al.
[10]
Remote Network Monitoring Management Information Base Version 2 using SMIv2
1997S. Waldbusser
[11]
Introduction to algorithms
1996R. Shyamasundar
[12]
Pong: A Flexible Network Services Monitoring System
1994Helen E. Harrison, Michael C. Mitchell et al.
[13]
Network intrusion detection
1994Biswanath Mukherjee, Todd L. Heberlein et al.
[14]
Navigating large networks with hierarchies
1993S. Eick, Graham J. Wills
[15]
Remote Network Monitoring Management Information Base
1991S. Waldbusser
[16]
Introduction to the theory of computation
1989E. Gurari
[17]
An Intrusion-Detection Model
1986D. Denning
[18]
Data structures and network algorithms
1983R. Tarjan

Founder's Pitch

"Automated role classification algorithms enhance network management and security by grouping hosts based on connection patterns."

Network SecurityScore: 6View PDF ↗

Commercial Viability Breakdown

0-10 scale

High Potential

0/4 signals

0

Quick Build

2/4 signals

5

Series A Potential

4/4 signals

10

Sources used for this analysis

arXiv Paper

Full-text PDF analysis of the research paper

GitHub Repository

Code availability, stars, and contributor activity

Citation Network

Semantic Scholar citations and co-citation patterns

Community Predictions

Crowd-sourced unicorn probability assessments

Analysis model: GPT-4o · Last scored: 3/10/2026

Explore the full citation network and related research.

7-day free trial. Cancel anytime.

Understand the commercial significance and market impact.

7-day free trial. Cancel anytime.

Get detailed profiles of the research team.

7-day free trial. Cancel anytime.

Related Papers

Loading…