Progressing from Anomaly Detection to Automated Log Labeling and Pioneering Root Cause Analysis.
Thorsten WittkoppAlexander AckerOdej KaoPublished in: ICDM (Workshops) (2023)
Keyphrases
- anomaly detection
- root cause analysis
- log records
- intrusion detection
- network intrusion detection
- anomaly based intrusion detection
- root cause
- decision support
- unsupervised learning
- network traffic
- detecting anomalies
- anomalous behavior
- intrusion detection system
- unsupervised anomaly detection
- network intrusion
- behavior analysis
- negative selection algorithm
- detecting anomalous
- one class support vector machines
- network anomaly detection
- network security
- computer security
- active learning
- detect anomalies
- image segmentation
- connectionist systems
- information retrieval
- feature selection
- dimensionality reduction
- knowledge discovery
- data mining
- real world
- cumulative sum
- expert systems
- data sets