透過您的圖書館登入
IP:18.188.44.223
  • 期刊

Improving Security through Analysis of Log Files Intersections

並列摘要


The paper discusses our research in development of general and systematic methods for intrusion prevention. The key idea is to use data mining techniques to discover repeated patterns of system features that describe program and user behavior. Server systems customarily write comprehensive activity logs whose value is useful in detecting intrusion. Unfortunately, production volumes overwhelm the capacity and manageability of traditional approach. This paper discusses the issues involving large-scale log processing that helps to analyze log records. Here, we propose to analyze intersections of firewall log files with application log files installed on one computer, as well as intersections resulting from firewall log files with application log files coming from different computers. Intersections of log files are substantially shorter than full logs and consist of records that indicate abnormalities in accessing single computer or set of computers. The paper concludes with some lessons we learned in building the system.

被引用紀錄


羅蕾(2017)。斯拉夫和中國古神話之比較〔碩士論文,淡江大學〕。華藝線上圖書館。https://doi.org/10.6846/TKU.2017.00458
張瑋婕(2007)。應用於低頻帶超寬頻系統使用三階諧波抑制技術之壓控環形振盪器〔碩士論文,中原大學〕。華藝線上圖書館。https://doi.org/10.6840/cycu200700524
蔡瓊滿(2014)。肉桂酸衍生物對肺癌侵入轉移性抑制功效之細胞試驗與機轉探討〔博士論文,中山醫學大學〕。華藝線上圖書館。https://doi.org/10.6834/CSMU.2014.00059
葉加亨(2011)。覆盆子抑制肺癌細胞之上皮間質轉化與其 移動及侵入之機制探討〔碩士論文,中山醫學大學〕。華藝線上圖書館。https://doi.org/10.6834/CSMU.2011.00014
王致為(2008)。紫花地丁與葉下珠抑制肺癌細胞侵入及移動能力之機制探討〔碩士論文,中山醫學大學〕。華藝線上圖書館。https://doi.org/10.6834/CSMU.2008.00120

延伸閱讀