Abstract
Security threat management system analyzes network status. Network analysis generally gives information about external network status and secures from external attacks by scrutiny of handling internal network. This paper expounds analysis of external network as well as internal network through application of association rule to the network event using data mining method. Essentially Apriori algorithm is used for data mining, yet not suitable for network traffic analysis on real-time. This paper devises and implement network event audit module using the network event association rule algorithm instead of Apriori algorithm.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Kim, H.-J., Kim, H.-G., Cho, T.-H.: Simulation model design of computer network for vulnerability assessment. In: International Workshop on Information Security Applications (WISA), vol. 2, pp. 203–217 (2001)
Reiser, H., Vogt, G.: Threat Analysis and Security Architecture of Mobile Agent based Management Systems. In: Proceedings of NOMS 2000 IEEE/IFIP Network Operations and Management Symposium “The Networked Planet: Management Beyond 2000”, Honolulu, Hawaii, USA (April 2000)
Kim, M.-S., Won, Y.J., Hong, J.W.-K.: Application-Level Traffic Monitoring and Analysis on IP Networks. ETRI Journal 27(1), 22–42 (2005)
Fernandez, M.C., Menasalvas, E., Marban, O.: Minimal Decision Rules Based on the Apriori Algorithm. Int. J. Appl. Math. Comput. Sci. 11(3), 691–704 (2001)
Ziegenhain, U., Bauer, J.G.: Triphone tying techniques combining a-priori rules and data driven methods. In: European Conference on Speech Communication and Technology (EUROSPEECH), vol. 2, pp. 1417–1420 (2001)
Honkela, T.: Data Mining and Document Modeling, Neural Networks Research Centre Helsinki University of Technology Tue (August 5, 1997)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Han, S., Soh, W. (2006). Development of Network Event Analysis Algorithm Applying Association Rule. In: Gavrilova, M.L., et al. Computational Science and Its Applications - ICCSA 2006. ICCSA 2006. Lecture Notes in Computer Science, vol 3984. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11751649_75
Download citation
DOI: https://doi.org/10.1007/11751649_75
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-34079-9
Online ISBN: 978-3-540-34080-5
eBook Packages: Computer ScienceComputer Science (R0)