The Application of Apriori Algorithm for Network Forensics Analysis
نویسندگان
چکیده
With frequently network attack crimes, it causes serious economic loss and bad social influence. Network security products are practically impossible to guard against intrusion methods, network forensics is needed. The massive network data must be captured and analyzed in network forensics, and the data is often related, the application of Apriori algorithm is proposed for network forensics analysis. After capturing and filtering network data package, and the Apriori algorithm is used to mine the association rules according to the evidence relevance to build and update signature database of offense, current user behavior is judged legal or not through pattern match results of user behavior and association rules which are stored in databases. The crime behaviors are saved in evidence database, which can be used as primitive evidence for network forensics. Simulation results show that the application of Apriori algorithm can raise the speed, exactitude and intelligence of data analysis for network forensics, the application can help to resolve the real-time, efficient and adaptable problems in network forensics.
منابع مشابه
Mining Anomaly using Association Rule
9 ABSTRACT In a world where critical equipments are connected to internet, hence protection against professional cyber criminals is important. Today network security, uptime and performance of network are important and serious issue in computer network. Anomaly is deviation from normal behavior which is factor that affects on network security. So Anomaly Extraction which detects and extracts an...
متن کاملEco-Efficiency Evaluation in Two-Stage Network Structure: Case Study: Cement Companies
The cement industry, as a primary trade, plays an important role in the development of a country's organization. This industry in Iran, however, despite of profuse benefits such as high-value mines, faces many challenges. Problems such as exploitation of the production require the need for doing research into this area. The main purpose of this paper is to examine the Eco-efficiency in Iran's 2...
متن کاملA Classification Engine for Image Ballistics of Social Data
Image Forensics has already achieved great results for the source camera identification task on images. Standard approaches for data coming from Social Network Platforms cannot be applied due to different processes involved (e.g., scaling, compression, etc.). Over 1 billion images are shared each day on the Internet and obtaining information about their history from the moment they were acquire...
متن کاملAnomaly Extraction Using Efficient-Web Miner Algorithm
Today network security, uptime and performance of network are important and serious issues in computer network. Anomaly is deviation from normal behaviour affecting network security. Anomaly Extraction is identification of unusual flow from network, which is need of network operator. Anomaly extraction aims to automatically find the inconsistencies in large set of data observed during an anomal...
متن کاملAnomaly Extraction Using Association Rule Mining
Today network security, uptime and performance of network are important and serious issue in computer network. Anomaly is deviation from normal behavior which is factor that affects on network security. So Anomaly Extraction which detects and extracts anomalous flow from network is requirement of network operator. Anomaly extraction refers to automatically finding in a large set of flows observ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013