Proceedings of the 2019 International Conference on Big Data and Education 2019
DOI: 10.1145/3322134.3322155
|View full text |Cite
|
Sign up to set email alerts
|

Internet Usage Patterns Mining from Firewall Event Logs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
1
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 12 publications
0
1
0
Order By: Relevance
“…Their study showed that smartphone users can be classified by their gender, smoking habits, software programming experience, etc. Polpinij and Namee [7] proposed the Generalized Sequential Patter (GSP) algorithm for sequential pattern mining. They used GSP for extracting interesting patterns of inappropriate user behaviors in real event logs from an organization in Thailand, which improved the QoS of the Internet service.…”
Section: Related Workmentioning
confidence: 99%
“…Their study showed that smartphone users can be classified by their gender, smoking habits, software programming experience, etc. Polpinij and Namee [7] proposed the Generalized Sequential Patter (GSP) algorithm for sequential pattern mining. They used GSP for extracting interesting patterns of inappropriate user behaviors in real event logs from an organization in Thailand, which improved the QoS of the Internet service.…”
Section: Related Workmentioning
confidence: 99%
“…Their study analyzed 93 firewall rules using machine learning algorithms, with KNN demonstrating the best performance. In the context of internet usage behavior, authors in one paper emphasized the importance of users' behavior for quality of service analysis and proposed a method using the Generalized Sequential Pattern (GSP) algorithm for data mining of web access logs stored in firewalls [16]. Another paper proposed a technique for analyzing the integration relations between IPv6 firewall rules and detecting anomalies using a formal verification configuration and the SMT solver Z3 [17].…”
Section: Introductionmentioning
confidence: 99%
“…M. A. M. Ariffin et al [23] implements unsupervised data mining approach to analyze the network traffic trend and type of traffic in campus network. J. Polpinij, & K. Namee [24] propose a ( Generalized Sequential Pattern (GSP) algorithm) , which is used for sequential pattern mining. Real event logs from an organization in Thailand were used in the study, and the results revealed significant findings that can lead to improvements in increasing the quality of service of the internet service.These studies collectively highlight the complexity of leveraging firewall event logs and implementing data mining techniques, indicating challenges related to precision, accuracy, feature selection, and rule set optimization.…”
Section: Introductionmentioning
confidence: 99%