Scalable and Adaptive Log-based Anomaly Detection with Expert in the Loop.
Jinyang LiuJunjie HuangYintong HuoZhihan JiangJiazhen GuZhuangbin ChenCong FengMinzhi YanMichael R. LyuPublished in: CoRR (2023)
Keyphrases
- anomaly detection
- intrusion detection
- anomalous behavior
- network intrusion detection
- unsupervised anomaly detection
- intrusion detection system
- network anomaly detection
- detecting anomalies
- network traffic
- behavior analysis
- one class support vector machines
- detect anomalies
- malware detection
- detecting anomalous
- computer security
- network intrusion
- network security
- decision trees
- negative selection algorithm
- connectionist systems
- probabilistic model