A Study of Applying Business Intelligence to Network Security.
碩士 === 大同大學 === 資訊經營學系(所) === 99 === More and more network related products including firewall, QoS, viruswall, IDS and so on were developed to help administrators monitor internet usage behaviors in response to network applications and management demands proposed by different departments in various...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2011
|
Online Access: | http://ndltd.ncl.edu.tw/handle/26027742457678022966 |
id |
ndltd-TW-099TTU05716027 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-099TTU057160272015-10-19T04:03:44Z http://ndltd.ncl.edu.tw/handle/26027742457678022966 A Study of Applying Business Intelligence to Network Security. 應用商業智慧於網路安全之研究 Tu Kuo-Ching 涂國慶 碩士 大同大學 資訊經營學系(所) 99 More and more network related products including firewall, QoS, viruswall, IDS and so on were developed to help administrators monitor internet usage behaviors in response to network applications and management demands proposed by different departments in various types of corporations. However, it requires administrators to log on different network devices for acquiring associated usage logs for further respective analysis whenever abnormal internet usage behavior occurred or the need for analyzing specific usage logs inside a department arose. Since each device has its specific user interface and record format, it is difficult and time consuming for administrators to manage usage logs from all the devices within a network. Therefore, how to provide administrators integrated information through one single platform for more effective management and efficient data inquiry is the aim of this research. This study proposed the measure that the usage logs from network devices can be stored in the data warehouse where the necessary information within a specific time period was acquired by business intelligence system for further comparison and integration. This method can not only save the time for log inquiries but also assist efficient internet user behavior analysis. Li Shing-Han 李興漢 2011 學位論文 ; thesis 114 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 大同大學 === 資訊經營學系(所) === 99 === More and more network related products including firewall, QoS, viruswall, IDS
and so on were developed to help administrators monitor internet usage behaviors in response to network applications and management demands proposed by different departments in various types of corporations. However, it requires administrators to log on different network devices for acquiring associated usage logs for further respective analysis whenever abnormal internet usage behavior occurred or the need for analyzing specific usage logs inside a department arose. Since each device has its specific user interface and record format, it is difficult and time consuming for administrators to manage usage logs from all the devices within a network. Therefore, how to provide administrators integrated information through one single platform for
more effective management and efficient data inquiry is the aim of this research.
This study proposed the measure that the usage logs from network devices can be
stored in the data warehouse where the necessary information within a specific time period was acquired by business intelligence system for further comparison and integration. This method can not only save the time for log inquiries but also assist efficient internet user behavior analysis.
|
author2 |
Li Shing-Han |
author_facet |
Li Shing-Han Tu Kuo-Ching 涂國慶 |
author |
Tu Kuo-Ching 涂國慶 |
spellingShingle |
Tu Kuo-Ching 涂國慶 A Study of Applying Business Intelligence to Network Security. |
author_sort |
Tu Kuo-Ching |
title |
A Study of Applying Business Intelligence to Network Security. |
title_short |
A Study of Applying Business Intelligence to Network Security. |
title_full |
A Study of Applying Business Intelligence to Network Security. |
title_fullStr |
A Study of Applying Business Intelligence to Network Security. |
title_full_unstemmed |
A Study of Applying Business Intelligence to Network Security. |
title_sort |
study of applying business intelligence to network security. |
publishDate |
2011 |
url |
http://ndltd.ncl.edu.tw/handle/26027742457678022966 |
work_keys_str_mv |
AT tukuoching astudyofapplyingbusinessintelligencetonetworksecurity AT túguóqìng astudyofapplyingbusinessintelligencetonetworksecurity AT tukuoching yīngyòngshāngyèzhìhuìyúwǎnglùānquánzhīyánjiū AT túguóqìng yīngyòngshāngyèzhìhuìyúwǎnglùānquánzhīyánjiū AT tukuoching studyofapplyingbusinessintelligencetonetworksecurity AT túguóqìng studyofapplyingbusinessintelligencetonetworksecurity |
_version_ |
1718095068708995072 |