A graph-based approach to detect unexplained sequences in a log
暂无分享,去创建一个
Marcello Cinque | Vincenzo Moscato | Giancarlo Sperlì | Raffaele Della Corte | M. Cinque | V. Moscato | Giancarlo Sperlí
[1] G. Manimaran,et al. Cybersecurity for Critical Infrastructures: Attack and Defense Modeling , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[2] Wei Xu,et al. Advances and challenges in log analysis , 2011, Commun. ACM.
[3] Bi Liu,et al. A Normalized Levenshtein Distance Metric , 2007, IEEE Trans. Pattern Anal. Mach. Intell..
[4] Francesco Folino,et al. An ensemble-based approach to the security-oriented classification of low-level log traces , 2020, Expert Syst. Appl..
[5] Pieter H. Hartel,et al. MELISSA: Towards Automated Detection of Undesirable User Actions in Critical Infrastructures , 2011, 2011 Seventh European Conference on Computer Network Defense.
[6] Marcello Cinque,et al. Contextual filtering and prioritization of computer application logs for security situational awareness , 2020, Future Gener. Comput. Syst..
[7] Wei Wang,et al. Using Large Scale Distributed Computing to Unveil Advanced Persistent Threats , 2012 .
[8] Juan Boubeta-Puig,et al. Integrating complex event processing and machine learning: An intelligent architecture for detecting IoT security attacks , 2020, Expert Syst. Appl..
[9] Antonio Pescapè,et al. Benchmarking big data architectures for social networks data processing using public cloud platforms , 2018, Future Gener. Comput. Syst..
[10] Dan Qu,et al. nLSALog: An Anomaly Detection Framework for Log Sequence in Security Management , 2019, IEEE Access.
[11] Simon Parkinson,et al. Discovering and utilising expert knowledge from security event logs , 2019, J. Inf. Secur. Appl..
[12] Yidong Li,et al. BotMark: Automated botnet detection with hybrid analysis of flow-based and graph-based traffic behaviors , 2020, Inf. Sci..
[13] Lawrence B. Holder,et al. Graph-Based Data Mining , 2000, IEEE Intell. Syst..
[14] Marcello Cinque,et al. Discovering process models for the analysis of application failures under uncertainty of event logs , 2020, Knowl. Based Syst..
[15] Evangelos E. Milios,et al. Clustering event logs using iterative partitioning , 2009, KDD.
[16] Manuel López Martín,et al. Application of deep reinforcement learning to intrusion detection for supervised problems , 2020, Expert Syst. Appl..
[17] Danai Koutra,et al. Graph based anomaly detection and description: a survey , 2014, Data Mining and Knowledge Discovery.
[18] Simon Parkinson,et al. Eliciting and utilising knowledge for security event log analysis: An association rule mining and automated planning approach , 2018, Expert Syst. Appl..
[19] Raouf Boutaba,et al. BotChase: Graph-Based Bot Detection Using Machine Learning , 2020, IEEE Transactions on Network and Service Management.
[20] Evangelos E. Milios,et al. A Lightweight Algorithm for Message Type Extraction in System Application Logs , 2012, IEEE Transactions on Knowledge and Data Engineering.
[21] Domenico Cotroneo,et al. Characterizing Direct Monitoring Techniques in Software Systems , 2016, IEEE Transactions on Reliability.