Design of Intelligent Substation Communication Network Security Audit System

Author(s):  
Wenting Wang ◽  
Xin Liu ◽  
Xiaohong Zhao ◽  
Yang Zhao ◽  
Rui Wang ◽  
...  
2013 ◽  
Vol 798-799 ◽  
pp. 534-537
Author(s):  
Zhi Ming Wang ◽  
Min Xia Liu ◽  
Hui Hu ◽  
Wu Xue Jiang

Aiming to increase network security auditing efficiency, an audit system with good efficiency has been generated through Agent and log mining technology. This paper improves the traditional association rule mining algorithm Apriori and designs a new data structure in which each brother node is in a parallel alignment, each child node has a pointer directing to their children node and sibling node, the audit system can only scan the database once. Experiments show that compared with traditional Apriori, the improved algorithm has greatly reduced the I/O expenditure of the system, having obvious superiority.


2010 ◽  
Vol 129-131 ◽  
pp. 1426-1431
Author(s):  
Xia Qing

This paper presents a security protection model of logs from the aspect of the system security architecture and technical feasibility, describes complete system architecture according to the system design objects, and gives the design process of each module in this system. Finally the proposed algorithm for association rules mining is experimentally tested in the network security audit system and there are satisfactory results.


Sign in / Sign up

Export Citation Format

Share Document