Attacker's Cluster in Web Log Mining
首发时间:2014-03-04
Abstract:According to analysis of web server logs attack events and security holes will be found, meanwhile attackers will also be discovered on the basis of source IP ad-dresses. To analyze logs and condense so many events, in this paper, attacker's similarity methods and the clus-ter algorithm are presented. After the definition of cha-racteristic matrix and the feature vector, an attacker clustering algorithm is devised. Each attacker has an feature vector, because of this the similarity of each attacker can be computed, user's clustering will be done according to their similarity. In addition effectiveness of this proposed algorithm will be proved by experiments.
keywords: web log law of cosines attacker's similarity cluster algorithm
点击查看论文中文信息
论文图表:
引用
No.4586778959116139****
同行评议
共计0人参与
勘误表
一种Web日志挖掘中的攻击者聚类算法
评论
全部评论0/1000