anomalyDetection: Implementation of Augmented Network Log Anomaly Detection Procedures

被引:7
|
作者
Gutierrez, Robert J. [1 ]
Boehmke, Bradley C. [1 ]
Bauer, Kenneth W. [1 ]
Saie, Cade M. [1 ]
Bihl, Trevor J. [1 ]
机构
[1] US Air Force, Inst Technol, 2950 Hobson Way, Wright Patterson AFB, OH 45433 USA
来源
R JOURNAL | 2017年 / 9卷 / 02期
关键词
EXPLORATORY FACTOR-ANALYSIS; INTRUSION-DETECTION;
D O I
10.32614/RJ-2017-039
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
As the number of cyber-attacks continues to grow on a daily basis, so does the delay in threat detection. For instance, in 2015, the Office of Personnel Management discovered that approximately 21.5 million individual records of Federal employees and contractors had been stolen. On average, the time between an attack and its discovery is more than 200 days. In the case of the OPM breach, the attack had been going on for almost a year. Currently, cyber analysts inspect numerous potential incidents on a daily basis, but have neither the time nor the resources available to perform such a task. anomalyDetection aims to curtail the time frame in which anomalous cyber activities go unnoticed and to aid in the efficient discovery of these anomalous transactions among the millions of daily logged events by i) providing an efficient means for pre-processing and aggregating cyber data for analysis by employing a tabular vector transformation and handling multicollinearity concerns; ii) offering numerous built-in multivariate statistical functions such as Mahalanobis distance, factor analysis, principal components analysis to identify anomalous activity, iii) incorporating the pipe operator (%>%) to allow it to work well in the tidyverse workflow. Combined, anomalyDetection offers cyber analysts an efficient and simplified approach to break up network events into time-segment blocks and identify periods associated with suspected anomalies for further evaluation.
引用
收藏
页码:354 / 365
页数:12
相关论文
共 50 条
  • [21] On the effectiveness of log representation for log-based anomaly detection
    Xingfang Wu
    Heng Li
    Foutse Khomh
    Empirical Software Engineering, 2023, 28
  • [22] Memory-augmented appearance-motion network for video anomaly detection
    Wang, Le
    Tian, Junwen
    Zhou, Sanping
    Shi, Haoyue
    Hua, Gang
    PATTERN RECOGNITION, 2023, 138
  • [23] An Efficient Network Log Anomaly Detection System using Random Projection Dimensionality Reduction
    Juvonen, Antti
    Hamalainen, Timo
    2014 6TH INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2014,
  • [24] Interpretable Spatial-Temporal Graph Convolutional Network for System Log Anomaly Detection
    Xu, Rucong
    Li, Yun
    ADVANCED ENGINEERING INFORMATICS, 2024, 62
  • [25] Log Anomaly Detection Based on Hierarchical Graph Neural Network and Label Contrastive Coding
    Fang, Yong
    Zhao, Zhiying
    Xu, Yijia
    Liu, Zhonglin
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 74 (02): : 4099 - 4118
  • [26] LLAD: Life-Log Anomaly Detection Based on Recurrent Neural Network LSTM
    Elbasani, Ermal
    Kim, Jeong-Dong
    JOURNAL OF HEALTHCARE ENGINEERING, 2021, 2021
  • [27] Log-TF-IDF and NETCONF-Based Network Switch Anomaly Detection
    Nam, Sukhyun
    Jeong, Eui-Dong
    Hong, James Won-Ki
    International Journal of Network Management, 2025, 35 (01)
  • [28] Log Anomaly Detection Model Based on Hybrid Feature Balanced Graph Attention Network
    混合特征平衡图注意力网络日志异常检测模型
    Zhang, Shuo (yinwo2597329@163.com), 2025, 61 (01) : 308 - 320
  • [29] Semi-supervised log anomaly detection based on bidirectional temporal convolution network
    Yin, Zhichao
    Kong, Xian
    Yin, Chunyong
    COMPUTERS & SECURITY, 2024, 140
  • [30] Temporal Logical Attention Network for Log-Based Anomaly Detection in Distributed Systems
    Liu, Yang
    Ren, Shaochen
    Wang, Xuran
    Zhou, Mengjie
    Sensors, 2024, 24 (24)