Abstract
The network logging important events during the operation of information on log analysis, found that the required security audit events and the law is the fundamental purpose. Based on the existing network security measures analysis, a new model of network security audit log is proposed. Dynamic increase of the model rules of the crisis on the network, according to the specific needs of some of the rules of the new additions and changes. At the same time adding in the log of the log classification system, greatly improving the efficiency of the audit log.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Cao, J.-G., Zheng, G.-P.: Research on distributed intrusion detection system based on mobile agent. In: Machine Learning and Cybernetics, July 12-15 (2008)
Xing, H.Y., Shi, j.: A Log Analysis Audit Model Based on Optimized Clustering Algorithm. In: Network and Parallel Computing Workshops, pp. 841–848 (2007)
Ka, I.-m., Zhu, H.-b., Keie, et al.: A novel intelligent intrusion detection, decision, response system. IEICE Trans. on Fundamentals of Electronics, Communications and Computer Sciences E89-A (6), 1630–1637 (2006)
Jagannathan, G., Wright, W.R.N.: Seventh IEEE International Conference on Data Mining Workshops – Title. Data Mining Workshops, ICDM Workshops, pp. 1–3 (2007)
Qu, X., Liu, Z., Xie, X.: Research on distributed intrusion detection system based on Protocol analysis. In: Anti-Counterfeiting, Security, and Identification in Communication, pp. 421–424 (2009)
Yawl: The analysis of restructuring IP pieces and the common attack on fragmentation, http://www.nsfocus1.com
Dharmapurikar, S., Lockwood, J.: Fast and Scalable Pattern Matching for Content. In: Architecture for Networking and Communications Systems, Princeton,NJ, pp. 183–192 (2008)
Jang, C., Kim, J., Jang, H., Park, S., Jang, B., Kim, B., Choi, E.: Rule-based auditing system for software security assurance. In: Ubiquitous and Future Networks, pp. 198–202 (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wu, G., Zheng, L., Lu, D. (2011). A New Log Audit Model to Improve the Effectiveness of Network Security Research. In: Zhiguo, G., Luo, X., Chen, J., Wang, F.L., Lei, J. (eds) Emerging Research in Web Information Systems and Mining. WISM 2011. Communications in Computer and Information Science, vol 238. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24273-1_30
Download citation
DOI: https://doi.org/10.1007/978-3-642-24273-1_30
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-24272-4
Online ISBN: 978-3-642-24273-1
eBook Packages: Computer ScienceComputer Science (R0)