Visualization Analysis of Network Behavior through Firewall Log Data

碩士 === 元智大學 === 資訊管理學系 === 102 === With the ever increasing attention on the information security of enterprises, the enterprises give top priority to establish the firewall mechanism between intranet and internet. The firewall is equipped with features of regulation setting, access control, directi...

Full description

Bibliographic Details
Main Authors: Li-Chin Kuo, 郭麗琴
Other Authors: Yi-Chuan Lu
Format: Others
Language:zh-TW
Online Access:http://ndltd.ncl.edu.tw/handle/vmce9k
id ndltd-TW-102YZU05396058
record_format oai_dc
spelling ndltd-TW-102YZU053960582019-05-15T21:23:56Z http://ndltd.ncl.edu.tw/handle/vmce9k Visualization Analysis of Network Behavior through Firewall Log Data 應用防火牆日誌資料視覺化分析網路行為 Li-Chin Kuo 郭麗琴 碩士 元智大學 資訊管理學系 102 With the ever increasing attention on the information security of enterprises, the enterprises give top priority to establish the firewall mechanism between intranet and internet. The firewall is equipped with features of regulation setting, access control, direction, and behavior monitoring; and these data are packed and recorded in the log. The main part of this study is to analyze the suspicious network behavior with the hidden information from the firewall log to further enhance the protection abilities of network security from inside. With the help of the visualized tool developed by JavaScript, this study views the firewall log as the sources of research information, designs and makes the visualized assistance tools for the analysis of firewall log. Visualization analysis makes managers understand the related network behaviors inside enterprises, enhance the readability of logs, speed up the analysis speed of managers and effectively enhance the abilities of responding to changes of managers. Yi-Chuan Lu 盧以詮 學位論文 ; thesis 76 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 元智大學 === 資訊管理學系 === 102 === With the ever increasing attention on the information security of enterprises, the enterprises give top priority to establish the firewall mechanism between intranet and internet. The firewall is equipped with features of regulation setting, access control, direction, and behavior monitoring; and these data are packed and recorded in the log. The main part of this study is to analyze the suspicious network behavior with the hidden information from the firewall log to further enhance the protection abilities of network security from inside. With the help of the visualized tool developed by JavaScript, this study views the firewall log as the sources of research information, designs and makes the visualized assistance tools for the analysis of firewall log. Visualization analysis makes managers understand the related network behaviors inside enterprises, enhance the readability of logs, speed up the analysis speed of managers and effectively enhance the abilities of responding to changes of managers.
author2 Yi-Chuan Lu
author_facet Yi-Chuan Lu
Li-Chin Kuo
郭麗琴
author Li-Chin Kuo
郭麗琴
spellingShingle Li-Chin Kuo
郭麗琴
Visualization Analysis of Network Behavior through Firewall Log Data
author_sort Li-Chin Kuo
title Visualization Analysis of Network Behavior through Firewall Log Data
title_short Visualization Analysis of Network Behavior through Firewall Log Data
title_full Visualization Analysis of Network Behavior through Firewall Log Data
title_fullStr Visualization Analysis of Network Behavior through Firewall Log Data
title_full_unstemmed Visualization Analysis of Network Behavior through Firewall Log Data
title_sort visualization analysis of network behavior through firewall log data
url http://ndltd.ncl.edu.tw/handle/vmce9k
work_keys_str_mv AT lichinkuo visualizationanalysisofnetworkbehaviorthroughfirewalllogdata
AT guōlìqín visualizationanalysisofnetworkbehaviorthroughfirewalllogdata
AT lichinkuo yīngyòngfánghuǒqiángrìzhìzīliàoshìjuéhuàfēnxīwǎnglùxíngwèi
AT guōlìqín yīngyòngfánghuǒqiángrìzhìzīliàoshìjuéhuàfēnxīwǎnglùxíngwèi
_version_ 1719114453314699264