Abstract

With the continuous development of information technology and the continuous progress of traffic bandwidth, the types and methods of network attacks have become more complex, posing a great threat to the large-scale campus network environment. To solve this problem, a network traffic anomaly detection model based on subspace information entropy flow matrix and a subspace anomaly weight clustering network traffic anomaly detection model combined with density anomaly weight and clustering ideas are proposed. Under the two test sets of public dataset and collected campus network data information of a university, the detection performance of the proposed anomaly detection method is compared with other anomaly detection algorithm models. The results show that the proposed detection model is superior to other models in speed and accuracy under the open dataset. And the two traffic anomaly detection models proposed in the study can well complete the task of network traffic anomaly detection under the large-scale campus network environment.

1. Introduction

With the continuous upgrading of the network traffic bandwidth, the amount of network users and the network information amount increase exponentially. The constantly expanding amount of information makes the content and form of network communication more abundant [1]. Although the expansion of healthy and high-quality online information is adorable, the number of disastrous cyberattacks is also increasing. How to deal with more high-frequency cyber threats has become a problem for everyone nowadays [2]. In particular, campus networks are relatively more frequently attacked; therefore, campus networks need to strengthen the means to cope with the problem of cyber threats after being attacked, in addition to the need for continuous reinforcement at the protection level [3]. The anomaly detection of information carriers in campus network belongs to the anomaly detection of large-scale information carriers. In addition to the accuracy of detection, the efficiency and cost of anomaly detection should also be considered when detecting the campus network [4]. The problem of campus network traffic anomaly detection is a large-scale traffic anomaly detection problem, and the efficiency and cost of anomaly detection should be considered in addition to the accuracy of detection when performing detection on campus networks [5]. In this regard, literature [6] proposed a network intrusion detection model based on wavelet neural network; literature [7] proposed a traffic anomaly detection method combining feature dimensionality reduction; and literature [8] proposed an active intrusion detection framework based on density perception and feature deviation of network traffic flow. However, the existing research has not solved these problems well.

To further improve the detection efficiency and accuracy, the research is based on subspace combined with information entropy traffic matrix and clustering algorithm to explore large-scale campus network traffic anomaly detection. Combining density anomaly weight and clustering idea, a network traffic detection model based on subspace anomaly weight clustering is proposed to distinguish normal and abnormal network traffic. We have achieved network traffic anomaly detection in a large-scale campus network environment and extended this method to anomaly detection in other large-scale information carriers, which has certain promotion and application value. In practical applications, this model and its extensions can be used in anomaly detection tasks of large-scale information carriers such as campus networks to improve the level of network security and ensure the safe and reliable dissemination of network information. In addition, this study also has a certain driving effect on in-depth research in the fields of subspace decomposition, information entropy calculation, and clustering algorithms.

To help maintain the safe and stable operation of the campus network, the study of anomaly detection strategies for large-scale campus network traffic has become a focal topic nowadays. This topic has been thoroughly studied by researchers at home and abroad. Amoozegar et al. conceived an anomaly tracker in online subspace. The tracker can perform more accurate anomaly detection for data with relatively low rank and relatively sparse components and can better deal with sudden changes in subspace. Experimental evaluation using datasets with different sparsities shows that the accuracy of this method is better than others [9]. Zhong et al. conceived a new preprocessing method using subspace similarity detection to solve the problem of low quality of data mining in the Internet of Things. This method can flexibly handle sporadic sensor data of similar types in nature, which exists in many environmental sensing applications. Through evaluation experiments, it is proved that this method has high accuracy [10]. Guo et al. conceived a deep learning method for detecting network carrier information abnormalities to enhance the security of data in network transmission. This method combines multiple convolutional automatic encoders with long-term and short-term memory networks to reduce the feature loss. The loss values in CAE (convolutional automatic encoder) and SAE (stacked automatic encoder) training in the experiment are compared, and the results are better than other studies [11]. Song et al. constructed a Hurst (H) parameter for evaluating network traffic to detect network information carrier anomalies, formed a set of information features on this basis, formalized the normal and abnormal behaviors of the system, and conducted static analysis based on the flow. The experimental results show that using this algorithm in the IOT communication infrastructure can significantly improve the level of information security and reduce the risk of information loss [12]. Zhong et al. organically combined a variety of deep learning neural networks to build a brand-new anomaly information detection framework. The framework trains LSTM with data with anomaly score tags and obtains the final anomaly score by weighting. The experimental results show that the framework has stronger adaptability and accuracy in anomaly information detection than other detection frameworks [13].

Zhang et al. have constructed a solution for anomaly detection of power grid information carrier. This method originates from the multilayer echo state network (ML-ESN). It uses Pearson and Gini coefficient methods to calculate the statistical distribution and correlation of network traffic characteristics first, and then ML-ESN is used to classify network anomaly attacks. Experiments are conducted on a public network security dataset, which shows that the accuracy of this method is extremely high, significantly higher than other methods [14]. Peng et al. conceived a network information carrier anomaly detection method, which relies on a Mahout classifier. The experimental results show that this method performs well in network information carrier anomaly detection and has higher accuracy and adaptability than other existing algorithms [15]. Wu et al. considered a hybrid feature selection method to improve the speed and accuracy of feature selection in anomaly detection of network information carriers. This method converts the interaction information between features into the redundancy of features and uses the method of deleting before and after random to test the influence of features on detection. The experimental results show that this method can quickly screen out feature subsets with better detectability and lower dimension [16]. Wang et al. have considered a method to solve the problem of dynamic variability of training model and deployment environment. This method converts network carrier information into numerical information and projects it into different dimensional spaces to form detection vectors. This method is capable of processing high-dimensional data and has strong generalization ability which makes anomaly detection easier. This method can effectively reduce the training cost, complete the detection task well, and has a high accuracy [17]. Aliguliyev et al. proposed a more accurate multiclassifier model for anomaly detection of network information carriers based on big data. Weka was used to conduct experiments on NSL-KDD datasets. The experimental results show that the model performs very well in anomaly detection accuracy [18]. Khatibzadeh et al. considered a mutation theory-based network information carrier anomaly detection model, which can effectively describe the process of abrupt changes in the network due to the dynamic nature of clouds. This model was compared with the general mutation theory model, and the results verify that the proposed method model has great advantages in accuracy and detection rate [19].

Through the in-depth research of many domestic and foreign researchers on the anomaly detection of network information carriers, it can be seen that the research on anomaly detection of large-scale campus network information carriers can be carried out using subspace method combined with traffic matrix and clustering algorithm. Therefore, the study proposes a large-scale campus network traffic anomaly detection method based on subspace, which has a certain role in promoting the research of network traffic anomaly check.

This study used three different datasets for testing and validation. When selecting and adjusting datasets, the following standards were followed: firstly, the dataset must contain normal network traffic and different types of network attacks; secondly, the size of the dataset should be large enough to cover different environments and scenarios; and the final dataset must have widespread use and benchmark value. The final selected datasets for the study were NSL-KDD, CSE-IC-IDS2018, and CIC-DDoS2019. The NSL-KDD dataset is one of the widely used datasets in the field of network intrusion detection. It is an improved version of the KDD Cup 1999 dataset, which includes four different types of attacks and normal network traffic. This dataset is used to evaluate the effectiveness of different network traffic anomaly detection methods. The CSE-IC-IDS2018 dataset contains different types of network traffic anomalies and attacks, such as DDoS attacks, SQL injection, and crosssite scripting attacks. This dataset contains a relatively small number of samples but covers various types of attacks and can be used to evaluate the accuracy and robustness of algorithms. The CIC-DDoS2019 dataset contains large-scale DDoS attacks and normal network traffic. This dataset is currently one of the largest available for evaluating large-scale DDoS attack detection algorithms. During the model testing process, research also needs to select and adjust specific parameters and thresholds in order to obtain the best detection results.

In addition, when adjusting hyperparameter, the following strategies are used: first, preprocess the dataset, such as missing value filling, data standardization, and normalization. This step can help us better understand and analyze the features of the dataset and reduce the impact of errors and noise. Secondly, select the hyperparameter, for example, the square prediction error threshold selected in this study. Once again, it is necessary to determine evaluation indicators to adjust the square prediction error threshold and study selecting indicators such as F1 score, precision, and recall for evaluation and adjustment. Afterwards, research will use methods such as grid search or random search. When choosing different combinations of hyperparameter and thresholds for adjustment, attention should be paid to avoiding overfitting or underfitting. Finally, evaluate the anomaly detection model. Then, according to the evaluation results, the hyperparameter can be fine-tuned again.

3. Research on Subspace-Based Anomaly Detection Method for Large-Scale Campus Network Traffic

3.1. Information Entropy Traffic Matrix Combined with Subspace Analysis for Network Traffic Anomaly Detection

Both subspace-based and information entropy-based network traffic anomaly detection methods are commonly used in detecting large-scale network carrier information systems. The study uses the traffic matrix to organically combine the two and construct a comprehensive model of information entropy traffic matrix combined with subspace methods for network traffic anomaly detection of large-scale campus network traffic [20]. The traffic matrix can facilitate the observation of the traffic distribution of the whole network system, then integrate and analyze the traffic distribution with the information of the routers so that the operation of the whole network link can be observed intuitively. When the traffic matrix produces huge fluctuations or changes, it represents an abnormality in the network, and the manager can trace the cause through that abnormality and complete the handling of the abnormality. If represents the traffic matrix of a network and the network has nodes, the expression of the traffic matrix of the network is shown in

In equation (1), each element represents a node pair and represents no. node pair. A node can generate links with nodes to generate node pairs, so there are node pairs in a traffic matrix. Let be the value of traffic on a link, be the number of links, and be the number of node pairs. In this network, there are nodes, and the amount of node pairs is . When the node pair passes through the link , the value of is 1; otherwise it is 0. The routing matrix = is a matrix, and each column in the matrix represents all the links that the node pair passes through. , i.e., . The link load and routing matrix obtained by the conventional method is seriously affected by the antecedent information, and the estimation results obtained have large errors, especially in the large-scale network environment. Therefore, the traffic matrix is analyzed by the information entropy method, which can describe the changes of environmental information more accurately, find abnormal conditions in the changes, and classify them. The self-information formula obtained by defining with information entropy is shown in

In equation (2), denotes the probability of generation of , when the expression of information entropy is shown in

Equation (4) is obtained according to the definition of information entropy.

Bringing equation (4) into equation (3), equation (5) is obtained.

In equation (5), represents the amount of times a specific attribute appears in the overall flow system, which is calculated as shown in

Use NetFlow to collect network data information such as destination port number, source IP address, total network data packet, protocol type, and total network data flow. These collected data are treated as information sources, and their attributes are considered random events and used to calculate the information entropy of all attributes. The observation of network traffic anomalies can be achieved by observing the entropy anomaly of the source or destination port number information and the source or destination IP address information. When their entropy values are in a smooth state and converging to 0, it indicates that the network data are in an ordered and discrete form. When the entropy value is fluctuating and the absolute value tends to a larger value, it indicates that the network data is in a disordered and concentrated form. By observing the change of information entropy curve, we can determine whether there is an abnormal situation in the network. As shown in Figure 1, the part of the SrcIP information entropy curve has obvious changes, which means an abnormal situation.

As shown in Figure 1, a large change in entropy value is produced when the time series is about 170 and 605, indicating that a network attack may occur at that moment. Taking the worm invasion as an example, when the attack occurs, the infected host will keep spreading randomly in the network area. When observing the network as a whole, its total network traffic packets and packet count may not change significantly. However, when observing the destination IP address, its information entropy changes dramatically as shown in Figure 1. The number of IP addresses increases rapidly due to the addition of many infected hosts in the network, and its information entropy value then decreases rapidly. By observing whether there are drastic fluctuations in information entropy can determine whether the network has abnormal conditions. The information entropy traffic matrix is combined with the subspace analysis method. The subspace analysis method is a very effective method to study anomaly detection. Its basic idea is to map the network traffic data into a subspace. Normal network traffic will be fully mapped into some subspace , while abnormal network traffic will deviate out and cannot be mapped into that subspace. Instead, abnormal network traffic will go to another subspace . Denote a traffic flow by and decompose it as shown in

In equation (7), represents normal network traffic, represents abnormal network traffic, and the magnitude of value represents the degree of traffic data abnormality. In the normal network traffic subspace, the principal components in it are processed by principal component analysis, as shown in

In equation (8), the columns of the matrix represent the feature vectors, is mapped to the normal network traffic subspace , and is mapped to the abnormal network traffic subspace . The squared prediction error (SPE) measure is used to measure values, as shown in

In equation (9), represents the square prediction error value. The squared prediction error is controlled for the conditions shown in equation (10) when the network traffic is in a normal state.

In equation (10), represents the threshold of the square prediction error, which is set according to different network situations. The anomaly space is judged again to find the real outliers, and the traffic is represented as equation (11) in the one-dimensional anomaly detection.

In equation (11), represents the nonanomalous flow sample vector, represents the magnitude of the anomalous flow sample, and represents the correlation vector of the anomalous flow sample. The best value estimation for the anomaly vector is calculated using the minimum value of the distance in the anomaly direction , and the result is shown in

Combining vector relations is shown in

Combining the above three equations leads to the optimal valuation is shown in

The optimal is selected to be mapped to the minimum value space of . The anomalous value of each anomaly sample is calculated and compared, and if exists, the flow is judged to be anomalous. Check all node pairs to determine if there are any abnormal traffic conditions. The individual anomaly parameters are replaced into the form of a matrix to perform similar detection operations and complete the task of anomaly detection for the whole traffic system. For a complex large-scale network system, a single characteristic information entropy value cannot judge all anomalies, so it is also necessary to combine information entropy values of multiple dimensions for network traffic. After serializing the information entropy values of multiple dimensions, the corresponding traffic matrix is derived, and then combined with subspace analysis to detect abnormal traffic among them. Using the threshold value as the basis for judgment, the flow of this network information carrier abnormality detection is shown in Figure 2.

3.2. Research on Network Traffic Anomaly Detection Based on Subspace Combined with Density Anomaly Weights and Clustering Ideas

Judging anomalous information based on the value domain only will lead to a large error. Introducing the idea of clustering in the subspace and combining the density anomaly weights to judge the anomalous information can greatly improve the ability of the algorithm [21]. Considering the elements in the subspace as different clusters, define the local density of a sample point and the shortest distance of this sample point from all sample points having higher density values. Both variables can be expressed using the point distance , when the local density is calculated as shown in

In equation (15), represents the truncation distance, when , the value of is 1. When , the value of is 0. In most cases, the number of points of the sample point in the neighborhood of is the same as the local density value, when the shortest distance is calculated as shown in

Taking the 2-dimensional space as an example, the sample points are represented by circles, and the numbers indicate the relative density of the sample points. The local density distribution of a certain sample space is shown in Figure 3.

Observing Figure 3, it can be seen that there are two class clusters in the distribution map with sample point 10 and sample point 1 as the clustering centers, respectively. The information of each sample point in the distribution map is extracted, the local density is used as the horizontal coordinate, and the shortest distance is used as the vertical coordinate to construct a decision map for the selection of sample point clustering centers. From the figure, it can be seen that sample point 9, although closer to sample point 10 in terms of local density, is far apart in terms of shortest distance, so they do not belong to the same class of clusters. It can be observed from the decision diagram that the points with both higher local density and larger shortest distance values can only be the clustering centers of the sample class clusters. Sample points that deviate from the group are shown to have a larger shortest distance and a lower relative density. Based on the above analysis, the anomaly weights of local density are used to describe as shown in

In equation (17), denotes a smoothing parameter taking values between 0 and 1, which is used to adjust the data samples adapted to different situations. is the distance between two sample points and . Applying the method to the subspace, the subspace clustering is viewed as a kind of data feature selection in 3D space, as shown in Figure 4.

There are several datasets in 3D space, as shown in Figure 4. The datasets are clustered into 4 class clusters, and the class clusters exist in 2-dimensional space; red and green two-class clusters exist on dimensions a and b. The third dimension belongs to noise. The blue and yellow class clusters exist on dimensions b and c. Let the number of feature values of original data feature space be and map them all to dimensional subspace. The number of dimensional subspace is and . At this time, the subspace is represented as , and the abnormal weight of each sample data in the subspace is . Calculate the abnormal weight values of all subspaces and perform corresponding processing. Record the abnormal weight values of each sample in the original data space sample according to the results. The algorithm model framework of network traffic anomaly detection based on subspace combined with density abnormal weight values and clustering idea is shown in Figure 5.

As shown in Figure 5, the sustainable and adaptive wireless charging (SAWC) model first obtains the campus network traffic data information from the campus network router, then applies feature selection on these data information and assigns them to the original space . Then the data of the original feature space is mapped to the subspaces of , and the anomaly weights are assigned to different subspaces in turn. Finally, the anomaly weights of each number of traffic are obtained, and they are integrated and sorted to complete the network traffic anomaly detection. The pseudocode of the SAWC model is as follows:

for all nodes v in the network:
  if v's energy level <= threshold:
   if there exists C in charging stations that can charge node v:
    Move charging battery C to node v;
   else:
    Move charging battery to nearest charging station;
  if v's energy level >= optimal_threshold:
   if there exists C in charging station that can be charged by node v:
    Move charging battery C to charging station
for charging station g:
  if g's energy level<= threshold:
    if there exist v in nodes that can charge charging station g:
     Move battery from node v to charging station g

4. Experiments and Analysis of Subspace-Based Anomaly Detection Method for Large-Scale Campus Network Traffic

This experiment selects the public dataset NSL-KDD and a sample dataset of one day’s data flow collected from a university campus network collected by router NetFlow for the experiment. The spatiotemporal interaction networks with factorization machines (SINFM) network traffic anomaly detection model and the SAWC network traffic anomaly detection model proposed in the study are compared with the extreme learning machine (ELM) network traffic anomaly detection model proposed in literature [5] and the support vector machine (SVM) network traffic anomaly detection model proposed in literature [20]. The SINFM pseudocode is as follows:

Input: spatiotemporal interaction networks with factorization machines (SINFM) dataset D = (X, Y, F, G, T)
Output: prediction result
1: Train dataset D with factorization machines
2: Calculate the embeddings for the temporal dataset
3: Calculate the embedding for each region
4: Calculate the embedding for each topic
5: Define the temporal interaction network
6: Define the spatial interaction network
7: Define the topic interaction network
8: Generate the three submatrices based on the three interaction networks
9: Train the interaction terms for spatiotemporal data in each submatrix
10: Calculate the scores of each testing item for each submatrix
11: Aggregate the scores of each testing item in the three submatrices
12: Output the final prediction result

The analysis experiments are conducted. The parameters of each model are tuned before the experiment to ensure the accuracy of the experiment. The square prediction error threshold of SINFM is set to 99.3%, the smoothing parameter of SAWC is set to 0.28, and the anomaly weight threshold of data traffic is set to 0.835. There are 7638 pieces of attack data, which is 13.43% of the total data. These data were normalized in the range of , and the types of attacks, types of attacks, number of attacks, and percentage of experimental data are shown in Table 1.

Comparing the accuracy of each algorithm model for network traffic anomaly detection under partial NSL-KDD dataset, the obtained experimental results are shown in Figure 6.

Figure 6 shows that all four network information carrier anomaly detection models have good anomaly detection functions, with overall accuracy rates of more than 90%. The best performers are SAWC and SVM, with an overall accuracy rate of 97.1%, which is 5% higher than ELM. For normal data traffic, SVM has the highest accuracy rate, followed by SAWC. Since normal traffic occupies the highest percentage of data, accurate release of normal traffic is an important means to effectively improve the accuracy of the traffic anomaly detection model. SINFM and ELM need to be improved in this regard. The best detection accuracy among the four types of attacks, DOS, probes, R2L, and U2R, is SAWC, and this result is in line with expectations, proving that SAWC has a good detection effect on network traffic anomalies. The performance of the SINFM model is not outstanding, and the detection accuracy of all types is at a medium level. This result is consistent with the expectation that the SINFM model is positioned to prioritize large-scale traffic processing, and its accuracy performance will not be particularly outstanding. The best overall performance for attack detection is achieved by SAWC, while SVM performs best in the detection of normal traffic but has a relatively low accuracy in the detection of all types of attacks. To continue comparing the detection speed of each model, 10 separate experiments were conducted on each model to record its data detection time, and the results obtained are shown in Figure 7.

Figure 7 shows that the average detection time of the proposed SINFM detection model is 11.67 seconds. The average detection time of the SAWC detection model proposed in the study is 15.72 seconds, which is faster than the comparison models. This experimental result is in line with expectations; that is, both models proposed in the study are designed to adapt to anomaly detection of large-scale campus network information carriers and require high data processing speed. During the construction, complex operations and judgment processes were reduced, and the operational efficiency of the model was improved. In terms of operational efficiency, the SINFM detection model has the best performance in the NSL-KDD dataset, followed by the SAWC detection model. In terms of detection accuracy, the SAWC detection model has the best performance, followed by the SVM detection model. Combining these two aspects, the SAWC detection model performs better overall, with faster detection speed while maintaining higher accuracy. Apply these four models to real-world scenarios and conduct experiments using CSE-IC-IDS2019 (large-scale campus network data), which is a sample dataset of one-day data streams collected from university campus networks through router NetFlow. The experimental results obtained are shown in Figure 8. This dataset contains 583495 data, of which 59135 are abnormal data, accounting for 10.13%.

The accuracy of the SAWC detection model is 97.81%, which is 12.99% higher than the ELM detection model and 2.01% higher than the SVM detection model. The recall rate of the SAWC detection model is 96.72%, which is 15.77% higher than the ELM detection model and 2.39% higher than the SVM detection model. Compared with the NSL-KDD dataset, the accuracy and recall rate of the SINFM detection model have been improved, indicating that the SINFM model is also well adapted to large-scale campus network information carrier anomaly detection tasks and has a faster detection speed. Reference [22] used a K-means hybrid model combined with the SVM algorithm for training on the dataset CSE-IC-IDS2018. Based on the tuning results of the models in various literatures, the corresponding model parameters were adjusted to continue the comparative experiment. The comparison results of the accuracy, precision, recall rate, and F1 score performance indicators of each model under the CIC-DDoS2018 dataset were obtained, as shown in Table 2.

As shown in Table 2, the SAWC detection model proposed in this paper performs the best in anomaly detection under the dataset CIC-DDoS2018, followed by the combined model of MRA S-dDCA. This experimental result proves that the clustering algorithm can play a good role in traffic anomaly detection, which has a great improvement on the accuracy and efficiency of the detection algorithm. Comprehensive analysis of the appeal experimental results shows that both the SAWC detection model and the SINFM model proposed in the study are better able to accomplish traffic anomaly detection in a large-scale campus network traffic environment, and the SINFM detection model is capable of the detection task, but the detection capability still needs to be improved. The SAWC detection model performs stably under multiple data, and both outperform similar algorithmic models.

This type of model needs to be able to handle large-scale datasets well and have good universality and adaptability. At the same time, the model should have high accuracy and robustness and be able to effectively detect and recognize under different types of attacks. In addition, the detection speed of the model should also be fast enough to adapt to real-time detection needs [24, 25]. The results obtained from this study meet these requirements.

Firstly, SAWC and SVM perform well in detecting normal traffic, which is related to their strong performance in handling classification problems and their ability to adapt well to large-scale datasets. Secondly, SAWC performs best in four types of attack detection, indicating that the SAWC model has better ability to identify and handle attack traffic. In addition, the performance of the SINFM model is not outstanding, which may be due to its greater focus on large-scale traffic processing without optimizing model performance. Finally, the SAWC detection model has faster detection speed and higher accuracy, indicating its superior performance in handling large-scale campus network information carrier anomaly detection tasks. In summary, the SAWC detection model has high feasibility and applicability in large-scale campus network information carrier anomaly detection tasks.

5. Conclusion

Aiming at the problem of traffic anomaly detection methods in large-scale campus networks, a SINFM detection model combined with information entropy traffic matrix and a SAWC model combined with density anomaly weight and clustering idea based on subspace analysis are proposed. The results showed that under the NSL-KDD dataset, the accuracy of the SAWC model was as high as 97.1%. The average detection time of SINFM is 11.57 seconds. The average detection speed of SAWC is 15.72 seconds. 13.22 s. Under the CSE-IC-IDS2019 dataset, the accuracy of the SAWC detection model is 97.81%, and the recall rate is 96.72%. Under the CIC-DDoS2018 dataset, the accuracy of SAWC is 99.72%, the accuracy is 99.22%, the recall rate is 99.56%, and the F1 score is 99.49%. Compared with other methods proposed in the literature, the SAWC model performs better than all other detection algorithm models. The experimental results meet expectations and demonstrate that the model proposed in the study can perform traffic anomaly detection in large-scale campus network environments. There are also some shortcomings in this study, such as insufficient sample richness in the experimental dataset, relatively simple actual campus network datasets, and insufficient meticulous data processing. It is expected that in future research, more campus network information datasets can be tested and adapted to more campus network environments to promote more comprehensive and accurate research.

Data Availability

The data used and/or analyzed during the current study are available from the corresponding author on reasonable request.

Conflicts of Interest

The authors declare that they have no conflicts of interest.