Sign in

Beehive: large-scale log analysis for detecting suspicious activity in enterprise networks.

Ting-Fang YenAlina OpreaKaan OnarliogluTodd LeethamWilliam K. RobertsonAri JuelsEngin Kirda
Published in: ACSAC (2013)
Keyphrases
  • log analysis
  • user behavior
  • log data
  • log files
  • web search engines
  • real world
  • anomaly detection
  • user queries
  • search logs