Network Security Analysis by Using Business Intelligence

  • et al.
N/ACitations
Citations of this article
6Readers
Mendeley users who have this article in their library.

Abstract

Network devices including firewall, QoS, Anti-Virus wall, IDS and so on were developed to help administrators monitor internet usage behaviors in response to network applications. However, it requires administrators to log on different network devices for acquiring associated usage logs for further respective analysis whenever abnormal network usage behavior occurred. It is both difficult and time consuming for administrators to manage usage logs from all the devices within a network. Therefore, how to provide administrators integrated information through one single platform for more effective management and efficient data inquiry is the aim of this research. This study proposed the measure that the usage logs from network devices can be stored in the data warehouse where the necessary information within a specific timeframe was acquired by business intelligence system for further comparison and integration. It can save the time for log inquiries and assist efficient network users behavior analysis.

Cite

CITATION STYLE

APA

Chen, W.-Y. … Tu, K.-C. (2015). Network Security Analysis by Using Business Intelligence. International Journal of Machine Learning and Computing, 5(6), 431–438. https://doi.org/10.18178/ijmlc.2015.5.6.547

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free