Progressing from Anomaly Detection to Automated Log Labeling and Pioneering Root Cause Analysis.
Thorsten WittkoppAlexander AckerOdej KaoPublished in: CoRR (2023)
Keyphrases
- anomaly detection
- root cause analysis
- log records
- unsupervised learning
- anomalous behavior
- anomaly based intrusion detection
- detecting anomalies
- root cause
- intrusion detection
- network intrusion detection
- decision support
- unsupervised anomaly detection
- behavior analysis
- image segmentation
- network traffic
- computer security
- detect anomalies
- negative selection algorithm
- network security
- network anomaly detection
- detecting anomalous
- intrusion detection system
- active learning
- network intrusion
- connectionist systems
- malware detection
- one class support vector machines
- cumulative sum
- decision trees