Log-based Network Security Audit System Research and Design
This paper presents a security protection model of logs from the aspect of the system security architecture and technical feasibility, describes complete system architecture according to the system design objects, and gives the design process of each module in this system. Finally the proposed algorithm for association rules mining is experimentally tested in the network security audit system and there are satisfactory results.
logs security audit association rules
Xia Qing
Huaihai Institute of Technology,Lianyungang,China,222005
国际会议
2010 International Conference on Material and Manufacturing Technology(2010材料与制造技术国际会议 ICMMT2010)
重庆
英文
1426-1431
2010-09-17(万方平台首次上网日期,不代表论文的发表时间)