Attack pattern mining algorithm based on security log.
Keyi LiYang LiJianyi LiuRu ZhangXi DuanPublished in: ISI (2017)
Keyphrases
- mining algorithm
- pattern mining
- security measures
- frequent subsequences
- association rule mining
- periodic patterns
- sequential patterns
- pattern discovery
- association rules
- discovering frequent
- frequent patterns
- sequential pattern mining
- tree structure
- itemsets
- graph patterns
- frequent itemsets
- minimum support
- incremental mining
- frequent item sets
- mining frequent
- data mining algorithms
- association mining
- frequent subgraphs
- data mining
- information security
- incremental updating
- data streams
- frequent itemset mining
- graph databases
- multi dimensional
- secret key
- frequent pattern mining
- preprocessing
- distance measure
- intrusion detection