A log-based mining system for network node correlation

被引:1
|
作者
Zhang, YZ [1 ]
Fang, BX [1 ]
Chi, Y [1 ]
Yun, XC [1 ]
机构
[1] Harbin Inst Technol, Res Ctr Comp Network & Informat Secur Technol, Harbin 150001, Peoples R China
来源
基金
中国国家自然科学基金;
关键词
network risk assessment; network node correlation; Bayesian network; system log;
D O I
10.1007/1-84628-352-3_17
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the field of network security, people become aware of the importance of study on the connectivity between network nodes. Based on analyzing the connectivity, this paper introduces a conception of network node correlation (NNC) and designs a novel log-based NNC mining system which adopts a typical distributed architecture based on agent. By means of bayesian network, this system can accurately and effectively mine high-level NNCs on application layer. The mined results can provide useful information for some security fields such as network risk assessment, vulnerability and intrusion detection, and virus propagation.
引用
收藏
页码:167 / +
页数:2
相关论文
共 50 条
  • [1] The Research of Log-Based Network Monitoring System
    Zhang, Li
    ADVANCES IN INTELLIGENT SYSTEMS, 2012, 138 : 315 - 320
  • [2] The Research of Log-based Network Monitoring System
    Zhang, Li
    2011 INTERNATIONAL CONFERENCE ON FUTURE COMPUTER SCIENCE AND APPLICATION (FCSA 2011), VOL 3, 2011, : 185 - 188
  • [3] Log-based transactional workflow mining
    Walid Gaaloul
    Khaled Gaaloul
    Sami Bhiri
    Armin Haller
    Manfred Hauswirth
    Distributed and Parallel Databases, 2009, 25 : 193 - 240
  • [4] Log-based transactional workflow mining
    Gaaloul, Walid
    Gaaloul, Khaled
    Bhiri, Sami
    Haller, Armin
    Hauswirth, Manfred
    DISTRIBUTED AND PARALLEL DATABASES, 2009, 25 (03) : 193 - 240
  • [5] Log-based Network Security Audit System Research and Design
    Qing, Xia
    MATERIALS AND MANUFACTURING TECHNOLOGY, PTS 1 AND 2, 2010, 129-131 : 1426 - 1431
  • [6] Log-based rich-semantic ABAC policy mining
    Wu W.-C.
    Ren Z.-Y.
    Du X.-H.
    Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2020, 54 (11): : 2149 - 2157
  • [7] Log-Based Cloud Monitoring System for OpenStack
    Agrawal, Vaibhav
    Kotia, Devanjal
    Moshirian, Kamelia
    Kim, Mihui
    2018 IEEE FOURTH INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING SERVICE AND APPLICATIONS (IEEE BIGDATASERVICE 2018), 2018, : 276 - 281
  • [8] Discussion on Log-based Computer Network Security Control
    Ni, Min
    2013 THE FOURTH INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATION AND EDUCATION APPLICATION (ICEA 2013), PT 1, 2013, 30 : 25 - 29
  • [9] Log-Based Testing
    Elyasov, Alexander
    2012 34TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), 2012, : 1591 - 1594
  • [10] Log-based mining techniques applied to Web service composition reengineering
    Gaaloul, Walid
    Baina, Karim
    Godart, Claude
    SERVICE ORIENTED COMPUTING AND APPLICATIONS, 2008, 2 (2-3) : 93 - 110