analyzing the access patterns of electronic resource is crucial for resource management and optimization. A method based on the classification and aggregation of network flows into long and short flows was proposed. By finely classifying and statistically analyzing traffic
it accurately assessed the usage behaviors of different types of users. First
a statistical analysis of traffic related to electronic resource access was performed on the campus network.Then
traffic data related to accessing Sci-Hub was constructed and analyzed. Finally
based on the statistical analysis of electronic resource access traffic
a method for classifying and aggregating long and short flows was proposed. This method effectively classifies electronic resource access behaviors.
WU H H , WANG B . An analysis of basic statistical data of Chinese academic libraries in 2022 [J ] . Journal of Academic Libraries , 2023 , 41 ( 6 ): 63 - 72 .
LIU L , FENG Q , WANG Z L . Research on anti-malicious download system of electronic resources—taking East China normal university as an example [J ] . Journal of Library Science , 2015 , 37 ( 1 ): 99 - 102 .
SHEN K L , SHAO B , DU J . The realization of digital resource monitoring system based on network log analysis [J ] . Research on Library Science , 2015 ( 16 ): 21 - 25 .
CHEN G . Design and application of electronic resource use statistical analysis system based on fiddler agent [J ] . Library and Information Service , 2018 , 62 ( 13 ): 30 - 36 .
YANG M , HE H T , ZHAO Q . Design and implementation of traffic big data security analysis platform [J ] . Journal on Communications , 2018 , 39 ( S1 ): 104 - 109 .
IN C S . A survey of network traffic monitoring and analysis tools [R ] . 2009 .
THOMPSON K , MILLER G J , WILDER R . Wide-area Internet traffic patterns and characteristics [J ] . IEEE Network , 1997 , 11 ( 6 ): 10 - 23 .
BROWNLEE N , CLAFFY K C . Understanding Internet traffic streams: dragonflies and tortoises [J ] . IEEE Communications Magazine , 2002 , 40 ( 10 ): 110 - 117 .
FU C P , LI Q , XU K . Flow interaction graph analysis: unknown encrypted malicious traffic detection [J ] . IEEE/ACM Transactions on Networking , 2024 , 32 ( 4 ): 2972 - 2987 .