Skip to main content

Development of Network Event Analysis Algorithm Applying Association Rule

  • Conference paper
Computational Science and Its Applications - ICCSA 2006 (ICCSA 2006)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3984))

Included in the following conference series:

  • 891 Accesses

Abstract

Security threat management system analyzes network status. Network analysis generally gives information about external network status and secures from external attacks by scrutiny of handling internal network. This paper expounds analysis of external network as well as internal network through application of association rule to the network event using data mining method. Essentially Apriori algorithm is used for data mining, yet not suitable for network traffic analysis on real-time. This paper devises and implement network event audit module using the network event association rule algorithm instead of Apriori algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Kim, H.-J., Kim, H.-G., Cho, T.-H.: Simulation model design of computer network for vulnerability assessment. In: International Workshop on Information Security Applications (WISA), vol. 2, pp. 203–217 (2001)

    Google Scholar 

  2. Reiser, H., Vogt, G.: Threat Analysis and Security Architecture of Mobile Agent based Management Systems. In: Proceedings of NOMS 2000 IEEE/IFIP Network Operations and Management Symposium “The Networked Planet: Management Beyond 2000”, Honolulu, Hawaii, USA (April 2000)

    Google Scholar 

  3. Kim, M.-S., Won, Y.J., Hong, J.W.-K.: Application-Level Traffic Monitoring and Analysis on IP Networks. ETRI Journal 27(1), 22–42 (2005)

    Article  Google Scholar 

  4. Fernandez, M.C., Menasalvas, E., Marban, O.: Minimal Decision Rules Based on the Apriori Algorithm. Int. J. Appl. Math. Comput. Sci. 11(3), 691–704 (2001)

    MATH  MathSciNet  Google Scholar 

  5. Ziegenhain, U., Bauer, J.G.: Triphone tying techniques combining a-priori rules and data driven methods. In: European Conference on Speech Communication and Technology (EUROSPEECH), vol. 2, pp. 1417–1420 (2001)

    Google Scholar 

  6. Honkela, T.: Data Mining and Document Modeling, Neural Networks Research Centre Helsinki University of Technology Tue (August 5, 1997)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Han, S., Soh, W. (2006). Development of Network Event Analysis Algorithm Applying Association Rule. In: Gavrilova, M.L., et al. Computational Science and Its Applications - ICCSA 2006. ICCSA 2006. Lecture Notes in Computer Science, vol 3984. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11751649_75

Download citation

  • DOI: https://doi.org/10.1007/11751649_75

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-34079-9

  • Online ISBN: 978-3-540-34080-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics