Publications-Conference Papers

Article View/Open

Publication Export

Google ScholarTM

NCCU Library

Citation Infomation

Related Publications in TAIR

題名 應用資料探勘技術於防火牆最適化策略訂定之先期研究
作者 林俊男
林克偉
林俊成
謝昆霖
關鍵詞 資訊安全 ; 資料探勘 ; 防火牆 ; 群聚分析
information security ; data mining ; firewall ; clustering analyrsis
日期 2006
上傳時間 18-Dec-2017 17:37:00 (UTC+8)
摘要 在有限的資源下,如何將效益發揮到最大是企業日前一個非常重要的課題,特別是關於資訊安全的相關議題,如何在現存的防禦設備下,發揮最大的防禦偵測能力,便是企業面臨的難題。本研究嘗試利用智慧型的資料探勘技術,從防禦設備—防火牆的日常紀錄檔中做群聚分析,以挖掘觀察出各種連線活動的特徵,經由特徵的判斷,找出適合一般性及各種特殊性的連線活動其適切的防禦偵測規則,以及其規則最適切的判斷順序組合。
It had become an important issue for making the efficiently performance under the limited resources to most enterprises, especial for the topic of information security. In this study, we intend to apply the data mining technique to mine the optimum strategy setting by using the clustering analysis for the log file. The characteristics kept behind the log file can be mined via the data mining technique, and the combination and the sequence of the strategy for the firewall can be obtained.
關聯 TANET 2006 台灣網際網路研討會論文集
資通安全、不當資訊防治
資料類型 conference
dc.creator (作者) 林俊男zh_TW
dc.creator (作者) 林克偉zh_TW
dc.creator (作者) 林俊成zh_TW
dc.creator (作者) 謝昆霖zh_TW
dc.date (日期) 2006
dc.date.accessioned 18-Dec-2017 17:37:00 (UTC+8)-
dc.date.available 18-Dec-2017 17:37:00 (UTC+8)-
dc.date.issued (上傳時間) 18-Dec-2017 17:37:00 (UTC+8)-
dc.identifier.uri (URI) http://nccur.lib.nccu.edu.tw/handle/140.119/115196-
dc.description.abstract (摘要) 在有限的資源下,如何將效益發揮到最大是企業日前一個非常重要的課題,特別是關於資訊安全的相關議題,如何在現存的防禦設備下,發揮最大的防禦偵測能力,便是企業面臨的難題。本研究嘗試利用智慧型的資料探勘技術,從防禦設備—防火牆的日常紀錄檔中做群聚分析,以挖掘觀察出各種連線活動的特徵,經由特徵的判斷,找出適合一般性及各種特殊性的連線活動其適切的防禦偵測規則,以及其規則最適切的判斷順序組合。
dc.description.abstract (摘要) It had become an important issue for making the efficiently performance under the limited resources to most enterprises, especial for the topic of information security. In this study, we intend to apply the data mining technique to mine the optimum strategy setting by using the clustering analysis for the log file. The characteristics kept behind the log file can be mined via the data mining technique, and the combination and the sequence of the strategy for the firewall can be obtained.
dc.format.extent 326116 bytes-
dc.format.mimetype application/pdf-
dc.relation (關聯) TANET 2006 台灣網際網路研討會論文集zh_TW
dc.relation (關聯) 資通安全、不當資訊防治zh_TW
dc.subject (關鍵詞) 資訊安全 ; 資料探勘 ; 防火牆 ; 群聚分析zh_TW
dc.subject (關鍵詞) information security ; data mining ; firewall ; clustering analyrsisen_US
dc.title (題名) 應用資料探勘技術於防火牆最適化策略訂定之先期研究zh_TW
dc.type (資料類型) conference