Study on Network Security Audit System Based on Agent Technology and Log Mining

Article Preview

Abstract:

Aiming to increase network security auditing efficiency, an audit system with good efficiency has been generated through Agent and log mining technology. This paper improves the traditional association rule mining algorithm Apriori and designs a new data structure in which each brother node is in a parallel alignment, each child node has a pointer directing to their children node and sibling node, the audit system can only scan the database once. Experiments show that compared with traditional Apriori, the improved algorithm has greatly reduced the I/O expenditure of the system, having obvious superiority.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 798-799)

Pages:

534-537

Citation:

Online since:

September 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Wang jianping, Chen Min, Wu Xianwen, A Novel Network Attack Audit System based on Multi-Agent Technology, Physics Procedia. 25(2012) 2152-2157.

DOI: 10.1016/j.phpro.2012.03.363

Google Scholar

[2] Jiawei Han, Micheline Kamber, Log system design in support of linkage analysis of security audit and computer forensics, Computer Engineering and Design. 30(2009)5580-5583.

Google Scholar

[3] Xu Suxia, Fu Xiufen, Hu jinpian, Application of Load Balancing in Intrusion Detection Based on Multi-Agent, Computer Engineering, 34(2008)184-191.

Google Scholar

[4] Liu Yongguo, Chen Kefei, Liao xiaofeng, Zhang Wei, A Genetic Clustering Method for Intrusion Detection, Pattern Recognition. 37(2004)927-942.

DOI: 10.1016/j.patcog.2003.09.011

Google Scholar

[5] Nan Feng, Jing Xie, A Bayesian networks-based security risk analysis model for information systems integrating the observed cases with expert experience, Scientific Research and Essays. 7(2012)1103-1112.

DOI: 10.5897/sre11.1792

Google Scholar

[6] Ding JF, Chou CC, A fuzzy MCDM model of service performance for container ports, Scientific Research Essays. 6(2011)559-566.

Google Scholar

[7] Shamik Sengupta, Mainak Chatterjee, and Kevin A Kwiat, A Game Theoretic Framework for Power Control in Wireless Sensor Networks, IEEE Transactions on Computers. 59(2010)231-242.

DOI: 10.1109/tc.2009.82

Google Scholar

[8] S. Cui, A.J. Goldsmith, ABahai, Energy-efficiency of MIMO and cooperative MIMO techniques in sensor networks, IEEE Journal on Selected Areas in Communications. 22(2004)1089-1098.

DOI: 10.1109/jsac.2004.830916

Google Scholar