Abstract

The purpose of network security auditing is to safeguard network and information security through the assessment of network security vulnerabilities. Data mining is mainly used to mine potential information from massive amounts of log data, which can provide both accurate and valuable auxiliary data for network security auditing and relevant information for monitoring and management of terminals in different network environments. Firstly, the theory of data mining technology is explained, secondly, some data mining algorithms applied to network security audit are discussed, and finally, the design difficulties and functions of the network security audit system based on data mining are studied, aiming to provide reference for securing network and identifying hidden risks.

Highlights

  • As the basis for achieving network security objectives, network security auditing enables timely detection of the harmful behavior in the system and secures the network by testing, evaluating, and analyzing the vulnerability of specific network security and enabling the identification of attacks and the tracking of violations of security laws

  • The core of the application of this technology in network security auditing is to select the appropriate data analysis algorithm by specifying the task and purpose of mining and compare and judge the nature of current network behavior based on the information implied by the logged behavior data [6]

  • It is important to note that data mining algorithms are not applicable to all network log data and must be combined with the purpose and task of network security auditing to select the appropriate algorithm

Read more

Summary

Introduction

As the basis for achieving network security objectives, network security auditing enables timely detection of the harmful behavior in the system and secures the network by testing, evaluating, and analyzing the vulnerability of specific network security and enabling the identification of attacks and the tracking of violations of security laws. The core of the application of this technology in network security auditing is to select the appropriate data analysis algorithm by specifying the task and purpose of mining and compare and judge the nature of current network behavior based on the information implied by the logged behavior data [6]. It can be either a causal or a simple correlation; so, it can be said that data correlation is a fundamental and important feature of databases The application of this technology in network security auditing is to analyze the correlation between security events by discovering the correlation of data sets, providing a basis for improving the Wireless Communications and Mobile Computing. Through the experimental analysis of data mining technology, we can know that the application of data mining in network security audit is mainly to mine useful data for security audit from massive data

Current Developments in Audit Technology
Implementation of Network Security Audit Based on Data Mining Technology
Experimental Analysis
Conclusions
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.