論文使用權限 Thesis access permission:校內校外完全公開 unrestricted
開放時間 Available:
校內 Campus: 已公開 available
校外 Off-campus: 已公開 available
論文名稱 Title |
從網路流量中發掘網際網路使用者之使用模式 MINING USER ACCESS PATTERNSFROM NETWORK FLOW ON THE INTERNET |
||
系所名稱 Department |
|||
畢業學年期 Year, semester |
語文別 Language |
||
學位類別 Degree |
頁數 Number of pages |
58 |
|
研究生 Author |
|||
指導教授 Advisor |
|||
召集委員 Convenor |
|||
口試委員 Advisory Committee |
|||
口試日期 Date of Exam |
2000-07-07 |
繳交日期 Date of Submission |
2000-07-18 |
關鍵字 Keywords |
存取模式、異常偵測、圖形相似度和距離、歸納法、錯誤修正圖形比對、屬性關連圖形、資料探採、高頻圖形 generalization, access patterns, large graph, graph similarity and distance, error-correcting graph matching, deviation detection, data mining, attributed releated graph |
||
統計 Statistics |
本論文已被瀏覽 5712 次,被下載 2558 次 The thesis/dissertation has been browsed 5712 times, has been downloaded 2558 times. |
中文摘要 |
本研究透過區域網路的路由器(router),收集使用者的存取記錄(log)並找出他們的使用模式(access patterns)。我們使用屬性關連圖形(attributed relational graph)來表達網路使用者的使用模式,然後使用高頻圖形(large graph generalization),來歸納出使用者共同的連線模式。並且使用錯誤修正圖形比對(error correcting graph matching)、鋒面鑑別(frontier identification)和模式庫鑑別(pattern base recognition)的方法,來偵測異常的連線模式。本篇研究最主要的貢獻在:使用屬性關連圖形來表達網路連線狀況,並且提出資料探採(data mining)的技術,以找出網路主要的使用模式並偵測異常狀況。本研究結果將有助於區域網路的管理和提高使用區域網路服務之使用者滿意度。 |
Abstract |
This thesis focuses on mining user access patterns from netflow database collected from the core router of a regional network center. We use the attributed relational graph representation to formulate user access patterns on the Internet, and then propose a procedure to generalize common connection patterns and detect deviation patterns with such methods as large graph generalization, error correcting graph matching, frontier identification and pattern base recognition. The major contributions of this thesis are on represeting the network connection with attributed relational graph and developing data mining tehcniques for identifying access paterns and detecting deviation. The results can be used for better managing regional network in order to improve user satification in using regional netwrok netwrok services. |
目次 Table of Contents |
Chapter1 Introduction Chapter2 Literature Review 2.1 Collecting and preprocessing user behavior history 2.2 Mining and discovering user behavior patterns 2.3 Structuring and analyzing user behavior information 2.4 Analyzing and detecting the deviation Chapter3 Generalizing the Common Access Patterns 3.1 Transaction data segmentation 3.2 Transaction data filtering 3.3 Access pattern transformation 3.4 Common graph discovery 3.5 Large Graph Discovery Algorithm Chapter4 Detecting the Deviation of Access Patterns 4.1 Graph distance measurement 4.2 Frontier identification Chapter5 Empirical Studies and Results 5.1 The mechanism to build netflow database 5.2 Characteristics of netflow database 5.3 Generalizing the common access pattern 5.4 Detecting the deviated access pattern Chapter6 Conclusions and Future work References Appendix |
參考文獻 References |
Agrawal, R., and T. Imielinske, and A. Swami. Mining Association Rules between Sets of Items in Large Databases, Proceedings of the ACM SIGMOD Conference on Management of Data, May 1993, pp. 207-216. Agrawal, R., and R. Srikant, Fast Algorithms for Mining Association Rules in Large Databases, Proceedings of the 20th International Conference on Very Large Databases, June 1994, pp. 487-499 Bayardo, R.J., “Efficiently mining long patterns from databases,” Proceedings of ACM SIGMOD International Conference on Management of data, June 1998, pp. 85 - 93 Bunke, H. and K. Shearer, “A graph distance metric based on the maximal common subgraph,” Pattern Recognition Letters, Vol. 19, Issue: 3-4, March 1998 pp. 227-384 Bunke, H., “Error correcting graph matching: on the influence of the underlying cost function,” IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 21, issue 9, Sept. 1999, pp. 917 - 922 Chartrand, G., G. Kubicki and M. Schultz, “Graph similarity and distance in graphs,” Aequationes Mathematicae, 55(1-2), 1998, pp. 129-145 Chen, M.S., J. S. Park and P. S. Yu, “Efficient Data Mining for Path Traversal Patterns in Distributed Systems,” Proceedings of the 16th IEEE Intern'l Conf. on Distributed Computing Systems, 27-30 May. 1996, pp. 385-392. Cooley, R., B. Mobasher and J. Srivastava, “Web mining: information and pattern discovery on the World Wide Web,” Proceedings of Ninth IEEE International Conference on Tools with Artificial Intelligence, 1997, pp. 558 – 567 Dunkel, B. and N. Soparkar, “Data Organization and Access for Efficient Data Mining,” Proceedings of 15th International Conference on Data Engineering, Mar. 1999, pp. 522 – 529 Holt, J.D. and S.M. Chung, “Efficient mining of association rules in text databases,” Proceedings of the eighth international conference on Information knowledge management, 1999, pp. 234 – 242 Hood, C.S., Chuanyi Ji, ” Proactive network fault detection,” Proceedings of IEEE Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '97), Vol. 3, April 1997, pp. 1147 – 1155 Jarrett, E.B., “Edge Rotation and Edge Slide Distance Graphs,” Computers and Mathematics With Applications, Vol.: 34, Issue: 11, Dec. 1997, pp. 1-128 Jensch, J., R. Luling and N. Sensen, “Optimising the file allocation of parallel Web server online using access patterns,” Proceedings of the 1998 ICPP Workshops on Architectural and OS Support for Multimedia Applications/Flexible Communication Systems/Wireless Networks and Mobile Computing, 14 Aug. 1998, pp. 66 – 74 Kubicka, E., G. Kubicki and I. Vakalis, “Using graph distance in object recognition,” Proceedings of the 1990 ACM eighteenth annual Computer Science Conference on Cooperation, 20-22 Feb. 1990, pp. 43-48 Lazar, S., D. Sidhu, S. Kodeswaran and R. Varadharaj, “ATM network discovery using mobile agents,” Conference on Local Computer Networks 1999 (LCN '99), Oct. 1999, pp. 98 – 105 Major, J. A., and D. R. Riendinger, “EFD: A Hybird Knowledge/Stastical-Based System for the Detection of Fraud,” International Journal of Intelligent Systems, vol. 7, 1992, pp.687-703 Lin, D. and Z.M. Kederm, “Pincer-Search: A New Algorithm for Discovering the Maximum Frequent Set,” Proceedings of 7th international Conference on Extending Database Technology, 1998. Lin, I. Y., X. M. Huang and M. S. Chen, “Capturing user access patterns in the Web for data mining,” Proceedings of 11th IEEE International Conference on Tools with Artificial Intelligence, 9-11 Nov. 1999, pp. 345 – 348 Lin, X., X. Zhou and Y. Lin, “Efficiently mining tree traversal patterns in a web environment,” 1998 IEEE Region 10 International Conference on Global Connectivity in Energy, Computer, Communication and Control, 17-19 Dec. 1998, pp. 115 – 117 Messmer, B. T. and H. Bunke, “New Algorithm for Error-Tolerant Subgraph Isomorphism Detection,” IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 20, No. 5, May 1998, pp. 493-504 Papadopoulos, A.N. and Y. Manolopoulos, “Structure-based similarity search with graph histograms,” Proceedings of Tenth International Workshop on Database and Expert Systems Applications, 1-3 Sept. 1999, pp. 174 – 178 Pei, J., J. Han, B. Mortazavi-Asl, and H. Zhu, “Mining Access Pattern efficiently from Web logs,” Proc. 2000 Pacific-Asia Conf. on Knowledge Discovery and Data Mining (PAKDD'00), Apr. 2000 Ronald, G., Graph Theory, Menlo Park, Calif, Benjamin/Cummings Pub. Co., 1988. Townsend, R. L., SNMP application developer's guide, New York : Van Nostrand Reinhold, 1995. Sanfeliu A. and K.S. Fu, “A Distance Measure between Attributed Relational Graphs for Pattern Recognition,“ IEEE Transactions on System, Man, and Cybernetics, Vol. 13, 1983, pp. 353-362 Taniguchi, M., M. Haft, J. Hollmen and V. Tresp, “Fraud detection in communication networks using neural and probabilistic methods,” Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing, Vol.2, May. 1998, pp. 1241 - 1244 Tsai, W.H and K.S. Fu, “Error-correcting isomorphism of attributed relational graphs for pattern recognition,“ IEEE Transactions on System, Man, and Cybernetics, Vol. 9, 1979, pp. 757-768 Yang, D.L. and J.C. Wang, “A Study on Mining Association Rules with Long Itemset Patterns,” International National Conference on Information Management”, Nsysu Taiwan, Mar. 2000, pp. pp.32 Zaiane, O.R., M. Xin and J. Han, “Discovering Web access patterns and trends by applying OLAP and data mining technology on Web logs,” Proceedings of IEEE International Forum on Research and Technology Advances in Digital Libraries (ADL 98), 2-24 Apr. 1998, pp. 9 – 29 Shoubridge, P., M. Kraetzl, D. Ray, “Detection of abnormal change in dynamic networks,” Proceedings of Information, Decision and Control, 1999 (IDC 99), 8-10 Feb. 1999, pp. 557 – 562. |
電子全文 Fulltext |
本電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。 論文使用權限 Thesis access permission:校內校外完全公開 unrestricted 開放時間 Available: 校內 Campus: 已公開 available 校外 Off-campus: 已公開 available |
紙本論文 Printed copies |
紙本論文的公開資訊在102學年度以後相對較為完整。如果需要查詢101學年度以前的紙本論文公開資訊,請聯繫圖資處紙本論文服務櫃台。如有不便之處敬請見諒。 開放時間 available 已公開 available |
QR Code |