A Study of Applying Business Intelligence to Network Security.

碩士 === 大同大學 === 資訊經營學系(所) === 99 === More and more network related products including firewall, QoS, viruswall, IDS and so on were developed to help administrators monitor internet usage behaviors in response to network applications and management demands proposed by different departments in various...

Full description

Bibliographic Details
Main Authors: Tu Kuo-Ching, 涂國慶
Other Authors: Li Shing-Han
Format: Others
Language:zh-TW
Published: 2011
Online Access:http://ndltd.ncl.edu.tw/handle/26027742457678022966
id ndltd-TW-099TTU05716027
record_format oai_dc
spelling ndltd-TW-099TTU057160272015-10-19T04:03:44Z http://ndltd.ncl.edu.tw/handle/26027742457678022966 A Study of Applying Business Intelligence to Network Security. 應用商業智慧於網路安全之研究 Tu Kuo-Ching 涂國慶 碩士 大同大學 資訊經營學系(所) 99 More and more network related products including firewall, QoS, viruswall, IDS and so on were developed to help administrators monitor internet usage behaviors in response to network applications and management demands proposed by different departments in various types of corporations. However, it requires administrators to log on different network devices for acquiring associated usage logs for further respective analysis whenever abnormal internet usage behavior occurred or the need for analyzing specific usage logs inside a department arose. Since each device has its specific user interface and record format, it is difficult and time consuming for administrators to manage usage logs from all the devices within a network. Therefore, how to provide administrators integrated information through one single platform for more effective management and efficient data inquiry is the aim of this research. This study proposed the measure that the usage logs from network devices can be stored in the data warehouse where the necessary information within a specific time period was acquired by business intelligence system for further comparison and integration. This method can not only save the time for log inquiries but also assist efficient internet user behavior analysis. Li Shing-Han 李興漢 2011 學位論文 ; thesis 114 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 大同大學 === 資訊經營學系(所) === 99 === More and more network related products including firewall, QoS, viruswall, IDS and so on were developed to help administrators monitor internet usage behaviors in response to network applications and management demands proposed by different departments in various types of corporations. However, it requires administrators to log on different network devices for acquiring associated usage logs for further respective analysis whenever abnormal internet usage behavior occurred or the need for analyzing specific usage logs inside a department arose. Since each device has its specific user interface and record format, it is difficult and time consuming for administrators to manage usage logs from all the devices within a network. Therefore, how to provide administrators integrated information through one single platform for more effective management and efficient data inquiry is the aim of this research. This study proposed the measure that the usage logs from network devices can be stored in the data warehouse where the necessary information within a specific time period was acquired by business intelligence system for further comparison and integration. This method can not only save the time for log inquiries but also assist efficient internet user behavior analysis.
author2 Li Shing-Han
author_facet Li Shing-Han
Tu Kuo-Ching
涂國慶
author Tu Kuo-Ching
涂國慶
spellingShingle Tu Kuo-Ching
涂國慶
A Study of Applying Business Intelligence to Network Security.
author_sort Tu Kuo-Ching
title A Study of Applying Business Intelligence to Network Security.
title_short A Study of Applying Business Intelligence to Network Security.
title_full A Study of Applying Business Intelligence to Network Security.
title_fullStr A Study of Applying Business Intelligence to Network Security.
title_full_unstemmed A Study of Applying Business Intelligence to Network Security.
title_sort study of applying business intelligence to network security.
publishDate 2011
url http://ndltd.ncl.edu.tw/handle/26027742457678022966
work_keys_str_mv AT tukuoching astudyofapplyingbusinessintelligencetonetworksecurity
AT túguóqìng astudyofapplyingbusinessintelligencetonetworksecurity
AT tukuoching yīngyòngshāngyèzhìhuìyúwǎnglùānquánzhīyánjiū
AT túguóqìng yīngyòngshāngyèzhìhuìyúwǎnglùānquánzhīyánjiū
AT tukuoching studyofapplyingbusinessintelligencetonetworksecurity
AT túguóqìng studyofapplyingbusinessintelligencetonetworksecurity
_version_ 1718095068708995072