A BM Algorithm Oriented on Network Security Audit System

Author(s):  
Xingxing Wang ◽  
BinZhu Ge ◽  
Weiming Wang
2013 ◽  
Vol 798-799 ◽  
pp. 534-537
Author(s):  
Zhi Ming Wang ◽  
Min Xia Liu ◽  
Hui Hu ◽  
Wu Xue Jiang

Aiming to increase network security auditing efficiency, an audit system with good efficiency has been generated through Agent and log mining technology. This paper improves the traditional association rule mining algorithm Apriori and designs a new data structure in which each brother node is in a parallel alignment, each child node has a pointer directing to their children node and sibling node, the audit system can only scan the database once. Experiments show that compared with traditional Apriori, the improved algorithm has greatly reduced the I/O expenditure of the system, having obvious superiority.


2010 ◽  
Vol 129-131 ◽  
pp. 1426-1431
Author(s):  
Xia Qing

This paper presents a security protection model of logs from the aspect of the system security architecture and technical feasibility, describes complete system architecture according to the system design objects, and gives the design process of each module in this system. Finally the proposed algorithm for association rules mining is experimentally tested in the network security audit system and there are satisfactory results.


2018 ◽  
Vol 245 ◽  
pp. 10007 ◽  
Author(s):  
Marina Bolsunovskaya ◽  
Svetlana Shirokova ◽  
Aleksandra Loginova ◽  
Mikhail Uspenskij

The aim of the work is to develop a procedure for conducting an information security audit of the software system for predicting data storage failures in order to identify existing threats to information security, evaluate information security tools, and improve the efficiency of existing information security tools and introduce new ones. It is necessary to monitor the current situation to ensure information security in organizations where data storage systems are used. For this purpose, an audit system has been developed, including both organizational measures and software and hardware parts.


2014 ◽  
Vol 641-642 ◽  
pp. 1280-1283
Author(s):  
Jin Peng Tang ◽  
Ling Lin Li

According to the requirements and characteristics of mobile Internet content security audit, designed and implemented the mobile Internet content security audit system. The system captured and processed data through a data acquisition proxy server for mobile user network access, and then set keywords by matching rules, finally carried out the content audit through the single mode and multi pattern matching algorithm.


Sign in / Sign up

Export Citation Format

Share Document