Affiliation:
1. Huaihai Institute of Technology
Abstract
This paper presents a security protection model of logs from the aspect of the system security architecture and technical feasibility, describes complete system architecture according to the system design objects, and gives the design process of each module in this system. Finally the proposed algorithm for association rules mining is experimentally tested in the network security audit system and there are satisfactory results.
Publisher
Trans Tech Publications, Ltd.
Reference6 articles.
1. Wenke Lee, Salvatore J. Stolfo, Philip K. Chan, et al. Real Time Data Mining-based Intrusion Detection[A]. In Proceedings of DARPA Information Survivability Conference & Exposition II(DISCEX'01)[C]. 2001, 1: 89-100.
2. Leon-Gacria Alberto, Communication networks: fundamental concepts and key architectures, Second Edition, IR, 2003: 235-412.
3. Mihael Ankerst. Human Involvement and Interactivity of the Next Generation's Data Mining Tools, ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery, Santa Barbara, GA, (2001).
4. Bialy Smith. Thinking about Security Monitoring and Event Correlation. November 3, (2000).
5. Richard Power, 2002 CSI/FBI Computer Crime and Security Survey [J]. Computer Security Issues & Trends, 2002 spring, Vol VIII, No. 1.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献