Login New user?  
01-Applied Mathematics & Information Sciences
An International Journal


Volumes > Volume 10 > No. 1


An Effective Network Security Log Mining Algorithm based on Fuzzy Clustering

PP: 307-315
Peng Wang, Xikun Ma, Jingjie Yu,
In this paper, we concentrate on the network security log mining problem, and proposed a novel fuzzy clustering algorithm to solve it. The architecture of network security log mining system is discussed at first, and three main modules are included in this system, such as data pre-processing, pattern mining and pattern analyzing. The main work of network security log mining is to find the frequent attack sequences from log files, several properties related to network security are considered in this paper, that is, start time of attacking, attacking type, end time of attacking, source IP of attackers, route path of attacking, attackers’ target IP, attackers’ port number, network protocol, and so on. To solve the problems in the traditional methods, we proposed a new modified fuzzy clustering algorithm by introducing the concept of interval weights, and attribute weights are denoted as interval constrained variables in our proposed algorithm. Afterwards, the final clustering results are obtained by minimizing an objective function through collaboratively optimizing the attribute weight. To testify the effectiveness of the proposed algorithm, we conduct experiments on a collection of network access log files under the real environment. Experimental results demonstrate that the proposed algorithm can achieve high quality clustering results with high time efficiency.

  Home   About us   News   Journals   Conferences Contact us Copyright naturalspublishing.com. All Rights Reserved