Landscape of automated log analysis: A systematic literature review and map** study
Ł Korzeniowski, K Goczyła - IEEE Access, 2022 - ieeexplore.ieee.org
Logging is a common practice in software engineering to provide insights into working
systems. The main uses of log files have always been failure identification and root cause …
systems. The main uses of log files have always been failure identification and root cause …
Temporal association rule mining: An overview considering the time variable as an integral or implied component
Association rules are commonly used to provide decision‐makers with knowledge that helps
them to make good decisions. Most of the published proposals mine association rules …
them to make good decisions. Most of the published proposals mine association rules …
[HTML][HTML] Exploring perceptions of decision-makers and specialists in defensive machine learning cybersecurity applications: The need for a standardised approach
Abstract Machine learning (ML) utilisation has achieved a vast global impact. This is evident
in the cybersecurity sector, where ML has wide-ranging applications, such as identifying and …
in the cybersecurity sector, where ML has wide-ranging applications, such as identifying and …
Object-centric process predictive analytics
Object-centric processes (also known as Artifact-centric processes) are implementations of a
paradigm where an instance of one process is not executed in isolation but interacts with …
paradigm where an instance of one process is not executed in isolation but interacts with …
SAX-ARM: Deviant event pattern discovery from multivariate time series using symbolic aggregate approximation and association rule mining
The discovery of event patterns from multivariate time series is important to academics and
practitioners. In particular, we consider the event patterns related to anomalies such as …
practitioners. In particular, we consider the event patterns related to anomalies such as …
LogNADS: Network anomaly detection scheme based on log semantics representation
X Liu, W Liu, X Di, J Li, B Cai, W Ren, H Yang - Future Generation …, 2021 - Elsevier
Abstract Semantics-aware anomaly detection based on log has attracted much attention.
However, the existing methods based on the weighted aggregation of all word vectors might …
However, the existing methods based on the weighted aggregation of all word vectors might …
[HTML][HTML] Context-based irregular activity detection in event logs for forensic investigations: An itemset mining approach
Event logs are a powerful source of digital evidence as they contain detailed information
about activities performed on a computer. Forensic investigation of the event logs is a …
about activities performed on a computer. Forensic investigation of the event logs is a …
Fast top-k association rule mining using rule generation property pruning
X Liu, X Niu, P Fournier-Viger - Applied Intelligence, 2021 - Springer
Traditional association rule mining algorithms can have a long runtime, high memory
consumption, and generate a huge number of rules. Browsing through numerous rules and …
consumption, and generate a huge number of rules. Browsing through numerous rules and …
An unsupervised approach for the detection of zero-day DDoS attacks in IoT networks
In this article, an unsupervised IDS (Intrusion Detection System) is presented for the
detection of zero-day DDoS (Distributed Denial of Service) attacks for IoT (Internet of Things) …
detection of zero-day DDoS (Distributed Denial of Service) attacks for IoT (Internet of Things) …
Cyber intrusion detection through association rule mining on multi-source logs
P Lou, G Lu, X Jiang, Z **ao, J Hu, J Yan - Applied Intelligence, 2021 - Springer
Security logs in cloud environment like intrusion detection system (IDS) logs, firewall logs,
and system logs provide historical information describing potential security risks. However …
and system logs provide historical information describing potential security risks. However …