A Study of Applying Business Intelligence to Network Security.

碩士 === 大同大學 === 資訊經營學系(所) === 99 === More and more network related products including firewall, QoS, viruswall, IDS and so on were developed to help administrators monitor internet usage behaviors in response to network applications and management demands proposed by different departments in various...

Full description

Bibliographic Details
Main Authors: Tu Kuo-Ching, 涂國慶
Other Authors: Li Shing-Han
Format: Others
Language:zh-TW
Published: 2011
Online Access:http://ndltd.ncl.edu.tw/handle/26027742457678022966
Description
Summary:碩士 === 大同大學 === 資訊經營學系(所) === 99 === More and more network related products including firewall, QoS, viruswall, IDS and so on were developed to help administrators monitor internet usage behaviors in response to network applications and management demands proposed by different departments in various types of corporations. However, it requires administrators to log on different network devices for acquiring associated usage logs for further respective analysis whenever abnormal internet usage behavior occurred or the need for analyzing specific usage logs inside a department arose. Since each device has its specific user interface and record format, it is difficult and time consuming for administrators to manage usage logs from all the devices within a network. Therefore, how to provide administrators integrated information through one single platform for more effective management and efficient data inquiry is the aim of this research. This study proposed the measure that the usage logs from network devices can be stored in the data warehouse where the necessary information within a specific time period was acquired by business intelligence system for further comparison and integration. This method can not only save the time for log inquiries but also assist efficient internet user behavior analysis.