OneLog: Towards End-to-End Training in Software Log Anomaly Detection.
Shayan HashemiMika MäntyläPublished in: CoRR (2021)
Keyphrases
- end to end
- anomaly detection
- anomalous behavior
- detecting anomalies
- intrusion detection
- computer network security
- network intrusion detection
- network anomaly detection
- admission control
- training set
- network traffic
- intrusion detection system
- one class support vector machines
- negative selection algorithm
- application layer
- computer systems
- network security
- congestion control
- unsupervised learning
- streaming data
- cumulative sum
- detect anomalies
- malware detection
- computer security
- transport layer
- probabilistic model
- window size
- object recognition