Analyzing network behaviors with knowledge acquisition and data warehousing

作者: Shian-Shyong Tseng , Po-Chih Huang , Shun-Chieh Lin , Nien-Yi Jan

DOI:

关键词: Data warehouseNetwork simulationData cubeOnline analytical processingKnowledge acquisitionData miningData scienceComputer science

摘要: As the growth of network environment dramatically increases, network-based applications and services become more important. Many researches have developed different systematic approaches to analyze traffic sources. However, data sources used in these are flat without using concept hierarchy dimension. In this paper, we propose Network Intrusion Monitoring System (NIMS) architecture based upon with level each dimension data. Besides, order reduce effort administrators behaviors, expertise analyzing behaviors need be acquired first. Therefore, a Knowledge Acquisition Behavior Model Construction (KABMC) schema which consists Flow Transformation (AFT) (BMA) processes is firstly proposed. The AFT generate basic knowledge model for acquiring reducing experts during acquisition process. BMA acquire from experts. behavior models enhance NIMS administrators.

参考文章(16)
George Alexander Kelly, The psychology of personal constructs. ,(1955)
Vern Paxson, Bro: a system for detecting network intruders in real-time Computer Networks. ,vol. 31, pp. 2435- 2463 ,(1999) , 10.1016/S1389-1286(99)00112-7
Hidenori Itoh, Research and Development on Knowledge Bases Systems at ICOT very large data bases. pp. 437- 445 ,(1986)
Jean Piaget, Rolando Garcia, L. Banks, Philip Minor Davidson, J. A. Easley, Toward A Logic of Meanings ,(1991)
R.K.C. Chang, Defending against flooding-based distributed denial-of-service attacks: a tutorial IEEE Communications Magazine. ,vol. 40, pp. 42- 51 ,(2002) , 10.1109/MCOM.2002.1039856
Gi Young Lim, Design on the knowledge acquisition tool for fuzzy knowledge base system ieee international conference on fuzzy systems. ,vol. 3, pp. 1638- 1642 ,(1999) , 10.1109/FUZZY.1999.790150
Jelena Mirkovic, Peter Reiher, A taxonomy of DDoS attack and DDoS defense mechanisms acm special interest group on data communication. ,vol. 34, pp. 39- 53 ,(2004) , 10.1145/997150.997156
Simon Hansman, Ray Hunt, A taxonomy of network and computer attacks Computers & Security. ,vol. 24, pp. 31- 43 ,(2005) , 10.1016/J.COSE.2004.06.011
W. Erhard, M.M. Gutzmann, H.M. Libati, Network traffic analysis and security monitoring with UniMon high performance switching and routing. pp. 439- 446 ,(2000) , 10.1109/HPSR.2000.856694