完整後設資料紀錄
DC 欄位語言
dc.contributor.author游適彰en_US
dc.contributor.authorShih-Chang Yuen_US
dc.contributor.author曾憲雄en_US
dc.contributor.authorShian-Shyong Tsengen_US
dc.date.accessioned2014-12-12T02:29:36Z-
dc.date.available2014-12-12T02:29:36Z-
dc.date.issued2001en_US
dc.identifier.urihttp://140.113.39.130/cdrfb3/record/nctu/#NT901706019en_US
dc.identifier.urihttp://hdl.handle.net/11536/69651-
dc.description.abstract隨著網際網路的盛行,電子郵件的使用日趨頻繁。然而垃圾郵件、商業廣告與病毒夾帶的郵件也因此層出不窮。一般的解決辦法是在使用者端執行郵件過濾管理功能,然而大多數的使用者並沒有太多的專業知識背景足以追查這些不請自來的郵件來源,甚至設定完善的過濾規則。即使啟動了過濾機制亦可能因設定錯誤造成本身使用上的不便。所以將過濾條件與控管機制交由伺服器端執行,才能避免上述問題的缺點。在此篇論文中,我們針對電子郵件記錄檔進行近似性資料探勘的研究,以協助系統管理員處理垃圾郵件與病毒郵件肆虐的問題。我們研究的重點在於利用兩階段資料探勘的方法,以近似模式進行關聯組合屬性分析,配合探索式規則以發掘電子郵件紀錄檔之中所蘊含的郵件傳送行為模式,目標是在即時有效的第一時間內偵測出大量傳送與異常發生的行為記錄分析結果。首先在第一階段,我們使用資料探勘前置處理流程,擷取記錄檔中重要的屬性欄位儲存至資料庫,作為後續研究的基礎來源。第二階段則是採用近似性資料探勘方法,針對大量異常與出現頻度較高的關聯組合進行分析。我們所獲得的分析結果將會記錄至關聯規則資料庫,進而提供系統管理員進行有效的管理決策參考依據,以防止類似行為的持續發生。zh_TW
dc.description.abstractAs e-mail service becomes popular on Internet, general problems such as UBE/UCE and virus mails have occurred more and more. Many client-side facilities have been developed to help users deal with such problems. However, since most users do not have enough resources and expertise to track theses abusing and make the necessary changes adaptively, few (if any) could benefit from applying these facilities. In general, if the filtering process could be done at the servers, these drawbacks could be avoided. In this thesis, we propose an approximation algorithm for mining e-mail logs to help deal with the anti-SPAM and anti-virus problems. The focus of our work is to apply the two-phase incremental mining processes with heuristic rules on e-mail logs for locating the embedded patterns of massively abnormal e-mail transactions in near real-time. In the first phase, we will make the ECTL preprocessing for extracting important attributes from the e-mail log and put them into the database for later use. In the second phase, we will apply the incremental mining algorithm with approximation to find the suspected outliers with massively anomalous e-mail transactions. The results could be integrated into the rule-base and utilized by the related system administrators for further preventing these kinds of abusing activities adaptively.en_US
dc.language.isoen_USen_US
dc.subject電子郵件記錄檔探勘zh_TW
dc.subject近似演算法zh_TW
dc.subject垃圾郵件zh_TW
dc.subject病毒郵件zh_TW
dc.subject資料探勘zh_TW
dc.subjecte-mail log miningen_US
dc.subjectapproximation algorithmen_US
dc.subjectspam mailen_US
dc.subjectvirus mailen_US
dc.subjectdata miningen_US
dc.title兩階段演算法應用於電子郵遞近似性關連規則之探勘研究zh_TW
dc.titleA Two-phase Algorithm for Association Rules Mining with Approximation on E-Mail Logen_US
dc.typeThesisen_US
dc.contributor.department資訊學院資訊學程zh_TW
顯示於類別:畢業論文