Title :
Network security data mining based on wavelet decomposition
Author_Institution :
Dept. of Econ. & Manage., North China Electr. Power Univ., Baoding
Abstract :
The network log file database is important to security management. But, with the development of Internet, it has become too bulkiness to be used directly. In this paper, the wavelet decomposition is adopted to mining the useful rules from the network security data. This is different from traditional data mining methods of association rules. Multi-resolution analysis of wavelet transform method is used to analyze and mine the data of network security log file database on different time scale. The period law of the attack number in different time domain is found by this method. These are important messages for taking relevant measures to insure network security.
Keywords :
Internet; computer network management; data mining; database management systems; discrete wavelet transforms; security of data; telecommunication security; Internet; association rule; discrete wavelet transform method; multiresolution analysis; network security data mining; network security log file database; security management; wavelet decomposition; Clustering algorithms; Data analysis; Data mining; Data security; Databases; Discrete wavelet transforms; Fourier transforms; Frequency; Information security; Wavelet analysis; Data mining; Discrete wavelet transform; Network log file database; security management;
Conference_Titel :
Intelligent Control and Automation, 2008. WCICA 2008. 7th World Congress on
Conference_Location :
Chongqing
Print_ISBN :
978-1-4244-2113-8
Electronic_ISBN :
978-1-4244-2114-5
DOI :
10.1109/WCICA.2008.4593932