Converting Unstructured System Logs into Structured Event List for Anomaly Detection.
Zongze LiMatthew DavidsonSong FuSean BlanchardMichael LangPublished in: ARES (2018)
Keyphrases
- anomaly detection
- structured data
- intrusion detection
- network intrusion detection
- network traffic
- unsupervised anomaly detection
- anomalous behavior
- detecting anomalies
- real world
- intrusion detection system
- computer security
- one class support vector machines
- network security
- detecting anomalous
- pattern recognition
- network intrusion
- behavior analysis
- abnormal events
- detect anomalies
- genetic algorithm
- network anomaly detection
- misuse detection
- data sets
- malware detection
- cumulative sum