Network devices including firewall, QoS, Anti-Virus wall, IDS and so on were developed to help administrators monitor internet usage behaviors in response to network applications. However, it requires administrators to log on different network devices for acquiring associated usage logs for further respective analysis whenever abnormal network usage behavior occurred. It is both difficult and time consuming for administrators to manage usage logs from all the devices within a network. Therefore, how to provide administrators integrated information through one single platform for more effective management and efficient data inquiry is the aim of this research. This study proposed the measure that the usage logs from network devices can be stored in the data warehouse where the necessary information within a specific timeframe was acquired by business intelligence system for further comparison and integration. It can save the time for log inquiries and assist efficient network users behavior analysis.
CITATION STYLE
Chen, W.-Y. … Tu, K.-C. (2015). Network Security Analysis by Using Business Intelligence. International Journal of Machine Learning and Computing, 5(6), 431–438. https://doi.org/10.18178/ijmlc.2015.5.6.547
Mendeley helps you to discover research relevant for your work.