Network connectivity search and network tra c analysis using a deductive database system with a statistical analysis component

نویسندگان

  • Akio Nishikawa
  • Kazutoshi Koike
  • Kenji Satou
  • Kazuo Ushijima
چکیده

This paper presents an experiment in the use of a deductive database system for computer network maintenance. There are relatively few practical applications of deductive databases. Takagi et.al. applied deductive databases to a practical problem. They utilized an indirect connectivity search capability of a deductive database system for a retrieval of complex con gurations in petrochemical pipeline plants. We applied the indirect connectivity search to computer network maintenance. However, it is not su cient for a tra c analysis of computer networks. Therefore, we equipped a statistical analysis component to a deductive database system and examined the applicability of this component to tra c analysis. Extraction of time series data from the deductive database is also discussed.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Connectivity as a Measure of Power System Integrity

Measures of network structural integrity useful in the analysis and synthesis of power systems are discussed. Signal flow methodology is applied to derive an expression for the paths between sources and sinks in a power network. Connectivity and reach ability properties of the network are obtained using the minors of a modified connectivity matrix. Node-connectivity, branch connectivity and mix...

متن کامل

Computer-Aided Tinnitus Detection based on Brain Network Analysis of EEG Functional Connectivity

Background: Tinnitus known as a central nervous system disorder is correlated with specific oscillatory activities within auditory and non-auditory brain areas. Several studies in the past few years have revealed that in the most tinnitus cases, the response pattern of neurons in auditory system is changed due to auditory deafferentation, which leads to variation and disruption of the brain net...

متن کامل

Learning Bayesian Network Structure Using Genetic Algorithm with Consideration of the Node Ordering via Principal Component Analysis

‎The most challenging task in dealing with Bayesian networks is learning their structure‎. ‎Two classical approaches are often used for learning Bayesian network structure;‎ ‎Constraint-Based method and Score-and-Search-Based one‎. ‎But neither the first nor the second one are completely satisfactory‎. ‎Therefore the heuristic search such as Genetic Alg...

متن کامل

Behavioral Analysis of Traffic Flow for an Effective Network Traffic Identification

Fast and accurate network traffic identification is becoming essential for network management, high quality of service control and early detection of network traffic abnormalities. Techniques based on statistical features of packet flows have recently become popular for network classification due to the limitations of traditional port and payload based methods. In this paper, we propose a metho...

متن کامل

An Ant Colony Optimization Algorithm for Network Vulnerability Analysis

Intruders often combine exploits against multiple vulnerabilities in order to break into the system. Each attack scenario is a sequence of exploits launched by an intruder that leads to an undesirable state such as access to a database, service disruption, etc. The collection of possible attack scenarios in a computer network can be represented by a directed graph, called network attack gra...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007