||A friendly, convenience and security are two contradictory goals faced by network managers. When using a strictly controlled network, users must be certified or registered in advance in order to ensure security. However, for temporary users, outsiders, and people who frequently use new devices, the process is often considered troublesome. An open and friendly internet environment allows users to simply plug-in cables or automatically search with wireless and get on internet without authentication yet compromises internet security. In the later environment, when the network is paralyzed by improper use of users or attacks on system, it is not easy to identify the users of the device that causes the problem.|
This study takes College network environment of University S as an example and collect MAC address and relative data of various devices through SNMP (Simple Network Management Protocol). These devices may be personal computers, laptop computers, tablet computers, mobile phones, printers or other devices that are controlled through internet. Due to the change of personnel, equipment and their location, the data about a device sometimes is inaccurate and need to be constantly updated. Therefore, In this thesis, I proposes a data mining approach to identifies devices with reliable data in connection with some problematic device whose data is either missing or inaccurate. These related devices may reveal the real identity of the owner of the problematic device.
Is experimental results show identifying clear identification and other equipment are highly related issues. Through the method of this research may identify problems with the device close group. Mining suitable for physical network address manually check in question, the fewer the number of devices more relevant. For network management equipment problems, there is a great help.