会议专题

An Improved Algorithm with Key Attributes Constraints for Mining Interesting Association Rules in Network Log

Computer logs are generated by application activities, network accesses and system audit, which are important data sources for user pattern mining, computer forensic analysis, intrusion detection analysis and outlier detection. Algorithms for mining association rule are useful methods to find interesting rules implied in large computer log data. But existing algorithms which based on confidence and support are unfit for mining computer log data, many uninteresting rules will be generated and useful rules will be shadowed. To solve this problem, the concept of key attributes of network log data is introduced, and an algorithm with key attributes constraints for mining interesting association rules in network log data is designed. Experimental result shows that the number of uninteresting rules can be reduced effectively and the validity of rules which mined are improved.

keyattribute associationrule networklog datamining

Jin Kezhong Wu chengwen

College of Physics and Electronic InformationEngineeringWenzhou UniversityWenzhou, China College of Physics and Electronic Information Engineering Wenzhou University Wenzhou, China

国际会议

2011 International Conference on Business Management and Electronic Information(2011商业管理与电子信息国际学术会议 BMEI2011)

广州

英文

1-4

2011-05-13(万方平台首次上网日期,不代表论文的发表时间)