A graph-based approach to detect unexplained sequences in a log

[1]  G. Manimaran,et al.  Cybersecurity for Critical Infrastructures: Attack and Defense Modeling , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[2]  Wei Xu,et al.  Advances and challenges in log analysis , 2011, Commun. ACM.

[3]  Bi Liu,et al.  A Normalized Levenshtein Distance Metric , 2007, IEEE Trans. Pattern Anal. Mach. Intell..

[4]  Francesco Folino,et al.  An ensemble-based approach to the security-oriented classification of low-level log traces , 2020, Expert Syst. Appl..

[5]  Pieter H. Hartel,et al.  MELISSA: Towards Automated Detection of Undesirable User Actions in Critical Infrastructures , 2011, 2011 Seventh European Conference on Computer Network Defense.

[6]  Marcello Cinque,et al.  Contextual filtering and prioritization of computer application logs for security situational awareness , 2020, Future Gener. Comput. Syst..

[7]  Wei Wang,et al.  Using Large Scale Distributed Computing to Unveil Advanced Persistent Threats , 2012 .

[8]  Juan Boubeta-Puig,et al.  Integrating complex event processing and machine learning: An intelligent architecture for detecting IoT security attacks , 2020, Expert Syst. Appl..

[9]  Antonio Pescapè,et al.  Benchmarking big data architectures for social networks data processing using public cloud platforms , 2018, Future Gener. Comput. Syst..

[10]  Dan Qu,et al.  nLSALog: An Anomaly Detection Framework for Log Sequence in Security Management , 2019, IEEE Access.

[11]  Simon Parkinson,et al.  Discovering and utilising expert knowledge from security event logs , 2019, J. Inf. Secur. Appl..

[12]  Yidong Li,et al.  BotMark: Automated botnet detection with hybrid analysis of flow-based and graph-based traffic behaviors , 2020, Inf. Sci..

[13]  Lawrence B. Holder,et al.  Graph-Based Data Mining , 2000, IEEE Intell. Syst..

[14]  Marcello Cinque,et al.  Discovering process models for the analysis of application failures under uncertainty of event logs , 2020, Knowl. Based Syst..

[15]  Evangelos E. Milios,et al.  Clustering event logs using iterative partitioning , 2009, KDD.

[16]  Manuel López Martín,et al.  Application of deep reinforcement learning to intrusion detection for supervised problems , 2020, Expert Syst. Appl..

[17]  Danai Koutra,et al.  Graph based anomaly detection and description: a survey , 2014, Data Mining and Knowledge Discovery.

[18]  Simon Parkinson,et al.  Eliciting and utilising knowledge for security event log analysis: An association rule mining and automated planning approach , 2018, Expert Syst. Appl..

[19]  Raouf Boutaba,et al.  BotChase: Graph-Based Bot Detection Using Machine Learning , 2020, IEEE Transactions on Network and Service Management.

[20]  Evangelos E. Milios,et al.  A Lightweight Algorithm for Message Type Extraction in System Application Logs , 2012, IEEE Transactions on Knowledge and Data Engineering.

[21]  Domenico Cotroneo,et al.  Characterizing Direct Monitoring Techniques in Software Systems , 2016, IEEE Transactions on Reliability.