anomalyDetection: Implementation of Augmented Network Log Anomaly Detection Procedures

被引:7
|
作者
Gutierrez, Robert J. [1 ]
Boehmke, Bradley C. [1 ]
Bauer, Kenneth W. [1 ]
Saie, Cade M. [1 ]
Bihl, Trevor J. [1 ]
机构
[1] US Air Force, Inst Technol, 2950 Hobson Way, Wright Patterson AFB, OH 45433 USA
来源
R JOURNAL | 2017年 / 9卷 / 02期
关键词
EXPLORATORY FACTOR-ANALYSIS; INTRUSION-DETECTION;
D O I
10.32614/RJ-2017-039
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
As the number of cyber-attacks continues to grow on a daily basis, so does the delay in threat detection. For instance, in 2015, the Office of Personnel Management discovered that approximately 21.5 million individual records of Federal employees and contractors had been stolen. On average, the time between an attack and its discovery is more than 200 days. In the case of the OPM breach, the attack had been going on for almost a year. Currently, cyber analysts inspect numerous potential incidents on a daily basis, but have neither the time nor the resources available to perform such a task. anomalyDetection aims to curtail the time frame in which anomalous cyber activities go unnoticed and to aid in the efficient discovery of these anomalous transactions among the millions of daily logged events by i) providing an efficient means for pre-processing and aggregating cyber data for analysis by employing a tabular vector transformation and handling multicollinearity concerns; ii) offering numerous built-in multivariate statistical functions such as Mahalanobis distance, factor analysis, principal components analysis to identify anomalous activity, iii) incorporating the pipe operator (%>%) to allow it to work well in the tidyverse workflow. Combined, anomalyDetection offers cyber analysts an efficient and simplified approach to break up network events into time-segment blocks and identify periods associated with suspected anomalies for further evaluation.
引用
收藏
页码:354 / 365
页数:12
相关论文
共 50 条
  • [1] Log Analysis and Prediction for Anomaly Detection in Network Switches
    Nam, Sukhyun
    Jeong, Euidong
    Hong, Jibum
    Yoo, Jae-Hyoung
    Hong, James Won-Ki
    2023 19TH INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE MANAGEMENT, CNSM, 2023,
  • [2] Network Log Anomaly Detection Based on GRU and SVDD
    Liu, Shirong
    Chen, Xiong
    Peng, Xingxiong
    Xiao, Ruliang
    2019 IEEE INTL CONF ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, BIG DATA & CLOUD COMPUTING, SUSTAINABLE COMPUTING & COMMUNICATIONS, SOCIAL COMPUTING & NETWORKING (ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM 2019), 2019, : 1244 - 1249
  • [3] Online Adaptive Anomaly Detection for Augmented Network Flows
    Ippoliti, Dennis
    Jiang, Changjun
    Ding, Zhijun
    Zhou, Xiaobo
    ACM TRANSACTIONS ON AUTONOMOUS AND ADAPTIVE SYSTEMS, 2016, 11 (03)
  • [4] Communication Network Anomaly Detection Based on Log File Analysis
    Cheng, Xin
    Wang, Ruizhi
    ROUGH SETS AND KNOWLEDGE TECHNOLOGY, RSKT 2014, 2014, 8818 : 240 - 248
  • [5] Log-TF-IDF for Anomaly Detection in Network Switches
    Nam, Sukhyun
    Yoo, Jae-Hyoung
    Hong, James Won-Ki
    PROCEEDINGS OF 2024 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, NOMS 2024, 2024,
  • [6] A Cognitive Memory-Augmented Network for Visual Anomaly Detection
    Tian Wang
    Xing Xu
    Fumin Shen
    Yang Yang
    IEEE/CAA Journal of Automatica Sinica, 2021, 8 (07) : 1296 - 1307
  • [7] A Cognitive Memory-Augmented Network for Visual Anomaly Detection
    Wang, Tian
    Xu, Xing
    Shen, Fumin
    Yang, Yang
    IEEE-CAA JOURNAL OF AUTOMATICA SINICA, 2021, 8 (07) : 1296 - 1307
  • [8] Access Log Anomaly Detection
    Tharshini, Ma
    Ragavinodini, M.
    Senthilkumar, Radha
    2017 NINTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2017, : 375 - 381
  • [9] LogNADS: Network anomaly detection scheme based on log semantics representation
    Liu, Xu
    Liu, Weiyou
    Di, Xiaoqiang
    Li, Jinqing
    Cai, Binbin
    Ren, Weiwu
    Yang, Huamin
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2021, 124 : 390 - 405
  • [10] LightLog: A lightweight temporal convolutional network for log anomaly detection on the edge
    Wang, Zumin
    Tian, Jiyu
    Fang, Hui
    Chen, Liming
    Qin, Jing
    COMPUTER NETWORKS, 2022, 203