• Jul 03, 2017 News!Good News! Since 2017, IJMLC has been indexed by Scopus!
  • Jul 06, 2017 News!Vol.7, No.2 has been published with online version.   [Click]
  • Jul 01, 2017 News!Vol.7, No.1 has been published with online version.   [Click]
Search
General Information
Editor-in-chief
Dr. Lin Huang
Metropolitan State University of Denver, USA
It's my honor to take on the position of editor in chief of IJMLC. We encourage authors to submit papers concerning any branch of machine learning and computing.
IJMLC 2015 Vol.5(6): 431-438 ISSN: 2010-3700
DOI: 10.18178/ijmlc.2015.5.6.547

Network Security Analysis by Using Business Intelligence

Wei-Yu Chen, Shing-Han Li, Mann-Jung Hsiao, Chung-Chiang Hu, and Kuo-Ching Tu
Abstract—Network devices including firewall, QoS, Anti-Virus wall, IDS and so on were developed to help administrators monitor internet usage behaviors in response to network applications. However, it requires administrators to log on different network devices for acquiring associated usage logs for further respective analysis whenever abnormal network usage behavior occurred. It is both difficult and time consuming for administrators to manage usage logs from all the devices within a network. Therefore, how to provide administrators integrated information through one single platform for more effective management and efficient data inquiry is the aim of this research. This study proposed the measure that the usage logs from network devices can be stored in the data warehouse where the necessary information within a specific timeframe was acquired by business intelligence system for further comparison and integration. It can save the time for log inquiries and assist efficient network users behavior analysis.

Index Terms—Audit, business intelligence, network security.

W. Y. Chen is with the Department of Information Management, Tatung University and also with the Department of Mass Communication, Chinese Culture University, Taipei, Taiwan (e-mail: cwy4@faculty.pccu.edu.tw).
S. H. Li is with the Department of Accounting Information, National Taipei University of Business, Taipei, Taiwan (e-mail: shli@ntub.edu.tw).
M. J. Hsiao is with the Department of Information Management, Kang-Ning Junior College of Medical Care and Management, Taipei, Taiwan (e-mail: hsiao@knjc.edu.tw).
C. C. Hu is with the Department of Computer Science and Engineering, Tatung University, Taipei, Taiwan (e-mail: cchu@ttu.edu.tw).
K. C. Tu is with the Department of Information Management, Tatung University, Taipei, Taiwan (e-mail: wj.tu@msa.hinet.net).

[PDF]

Cite: Wei-Yu Chen, Shing-Han Li, Mann-Jung Hsiao, Chung-Chiang Hu, and Kuo-Ching Tu, "Network Security Analysis by Using Business Intelligence," International Journal of Machine Learning and Computing vol.5, no. 6, pp. 431-438, 2015.

Copyright © 2008-2015. International Journal of Machine Learning and Computing. All rights reserved.
E-mail: ijmlc@ejournal.net