Anomaly Detection on Event Logs with a Scarcity of Labels.
Sylvio Barbon JuniorPaolo CeravoloErnesto DamianiNicolas Jashchenko OmoriGabriel Marques TavaresPublished in: ICPM (2020)
Keyphrases
- anomaly detection
- event logs
- process mining
- process model
- intrusion detection
- anomalous behavior
- detecting anomalies
- network intrusion detection
- business process
- pairwise
- intrusion detection system
- network traffic
- security policies
- log files
- one class support vector machines
- network anomaly detection
- training data
- business processes
- network security
- negative selection algorithm
- computer networks
- unsupervised learning
- co occurrence
- data analysis
- data mining