Data Mining on the Router Logs for Statistical Application Classification
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33122
Data Mining on the Router Logs for Statistical Application Classification

Authors: M. Rahmati, S.M. Mirzababaei

Abstract:

With the advance of information technology in the new era the applications of Internet to access data resources has steadily increased and huge amount of data have become accessible in various forms. Obviously, the network providers and agencies, look after to prevent electronic attacks that may be harmful or may be related to terrorist applications. Thus, these have facilitated the authorities to under take a variety of methods to protect the special regions from harmful data. One of the most important approaches is to use firewall in the network facilities. The main objectives of firewalls are to stop the transfer of suspicious packets in several ways. However because of its blind packet stopping, high process power requirements and expensive prices some of the providers are reluctant to use the firewall. In this paper we proposed a method to find a discriminate function to distinguish between usual packets and harmful ones by the statistical processing on the network router logs. By discriminating these data, an administrator may take an approach action against the user. This method is very fast and can be used simply in adjacent with the Internet routers.

Keywords: Data Mining, Firewall, Optimization, Packetclassification, Statistical Pattern Recognition.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1071366

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1663

References:


[1] P. Gupta, N. McKeown, "Algorithms for Packet Classification", IEEE Networks, Mar/Apr 2001.
[2] A. Benczur, K.Csalogany, A.Lukacs, B. Racz, C.Sidlo, M.Uher, L.Vegh, "An Architecture for Mining Massive Web Logs with Experiments", Project Report Data Riddle & OTKA & AKP ,2003.
[3] Q. Yang, H. Wang, W. Zhang, "Web-log Mining for Quantitative Temporal-Event Prediction", IEEE Computational Intelligence Bulletin, 2002.
[4] Z. Su, Q. Yang, H. Zhang, X. Xu, Y. Hu, "Correlation-based Document Clustering using Web Logs", Microsoft Research China Report, 1999-2000.
[5] K. Fukunaga, "Statistical Pattern Recognition", Academic Press Inc.
[6] W. Stallings, "Data and Computer Communications", Prentice Hall.
[7] E. Chong, S. Zak, "An Introduction to Optimization", John Wiley & Sons Inc.
[8] E. Khorram, S.M. Mirzababaei, "Finding an Optimized Discriminate Function ", Proceeding of ALDM-05, 2005.
[9] J. Cooper, "The Book of Webmin",avilable at: http:// www.swelltech.com/ support/ webminguide/ ch12.html, Amazon.ca,2003.
[10] IETF Standard Track Category: IETF Uniform Resource Locators (URL) Specification: RFC 1738.