Log-Based Network Security Audit System Research and Design

Article Preview

Abstract:

This paper presents a security protection model of logs from the aspect of the system security architecture and technical feasibility, describes complete system architecture according to the system design objects, and gives the design process of each module in this system. Finally the proposed algorithm for association rules mining is experimentally tested in the network security audit system and there are satisfactory results.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 129-131)

Pages:

1426-1431

Citation:

Online since:

August 2010

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2010 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Wenke Lee, Salvatore J. Stolfo, Philip K. Chan, et al. Real Time Data Mining-based Intrusion Detection[A]. In Proceedings of DARPA Information Survivability Conference & Exposition II(DISCEX'01)[C]. 2001, 1: 89-100.

DOI: 10.1109/discex.2001.932195

Google Scholar

[2] Leon-Gacria Alberto, Communication networks: fundamental concepts and key architectures, Second Edition, IR, 2003: 235-412.

Google Scholar

[3] Mihael Ankerst. Human Involvement and Interactivity of the Next Generation's Data Mining Tools, ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery, Santa Barbara, GA, (2001).

Google Scholar

[4] Bialy Smith. Thinking about Security Monitoring and Event Correlation. November 3, (2000).

Google Scholar

[5] Richard Power, 2002 CSI/FBI Computer Crime and Security Survey [J]. Computer Security Issues & Trends, 2002 spring, Vol VIII, No. 1.

Google Scholar

[6] TERRAN Lane, CARLA E Brodley, An Empirical Study of Two Approaches to Sequence Leaning for Anomaly Detection[J]. Machine Learning, 2003, 51(l): 73-107.

Google Scholar