On the Effectiveness of Log Representation for Log-based Anomaly Detection.
Xingfang WuHeng LiFoutse KhomhPublished in: CoRR (2023)
Keyphrases
- anomaly detection
- intrusion detection
- anomalous behavior
- detecting anomalies
- network anomaly detection
- network traffic
- network intrusion detection
- one class support vector machines
- detect anomalies
- intrusion detection system
- computer security
- network security
- unsupervised anomaly detection
- malware detection
- behavior analysis
- artificial immune system
- computer networks
- knowledge discovery
- machine learning
- detecting anomalous
- real world