Wavelet-Based Analysis of Network Security Databases

Wu Liu, Haixin Duan, Peng Wang, Jianping Wu, Lu Yang

Research output: Contribution to conferencePaperpeer-review

5 Scopus citations

Abstract

The phenomenal increase in the amounts of network security data are due to the hacker attacks, virus, worm and Slapper etc. Network security log file databases are very important in computer forensics. A lot of data mining methods to research it have been found, such as content-based queries and similarity searches to manage and use such data. Fast and accurate retrievals for content-based queries are crucial for such numerous database systems to be useful. In this paper, a new method is provided to analyze and mine this kind of time-serial database. We first signalize the NSD databases, then we use these wavelet based transforms to analyze the NSD and get the periodic law of intrusion event.

Original languageEnglish
Pages372-377
Number of pages6
StatePublished - 2003
Externally publishedYes
Event2003 International Conference on Communication Technology, ICCT 2003 - Beijing, China
Duration: 9 Apr 200311 Apr 2003

Conference

Conference2003 International Conference on Communication Technology, ICCT 2003
Country/TerritoryChina
CityBeijing
Period9/04/0311/04/03

Keywords

  • Computer forensics
  • Data mining
  • Network security databases (NSD)
  • Signalize
  • Wavelet transform

Fingerprint

Dive into the research topics of 'Wavelet-Based Analysis of Network Security Databases'. Together they form a unique fingerprint.

Cite this