Title :
An improved algorithm with key attributes constraints for mining interesting association rules in network log
Author :
Kezhong, Jin ; Chengwen, Wu
Author_Institution :
Coll. of Phys. & Electron. Inf. Eng., Wenzhou Univ., Wenzhou, China
Abstract :
Computer logs are generated by application activities, network accesses and system audit, which are important data sources for user pattern mining, computer forensic analysis, intrusion detection analysis and outlier detection. Algorithms for mining association rule are useful methods to find interesting rules implied in large computer log data. But existing algorithms which based on confidence and support are unfit for mining computer log data, many uninteresting rules will be generated and useful rules will be shadowed. To solve this problem, the concept of key attributes of network log data is introduced, and an algorithm with key attributes constraints for mining interesting association rules in network log data is designed. Experimental result shows that the number of uninteresting rules can be reduced effectively and the validity of rules which mined are improved.
Keywords :
computer forensics; data mining; pattern classification; security of data; association rule mining; computer forensic analysis; computer log data source; intrusion detection analysis; key attribute constraint; network access; network log data; outlier detection; user pattern mining; Algorithm design and analysis; Association rules; Computers; Databases; Performance evaluation; Protocols; association rule; data mining; key attribute; network log;
Conference_Titel :
Business Management and Electronic Information (BMEI), 2011 International Conference on
Conference_Location :
Guangzhou
Print_ISBN :
978-1-61284-108-3
DOI :
10.1109/ICBMEI.2011.5920405