anomalyDetection: Implementation of Augmented Network Log Anomaly Detection Procedures

被引:7
|
作者
Gutierrez, Robert J. [1 ]
Boehmke, Bradley C. [1 ]
Bauer, Kenneth W. [1 ]
Saie, Cade M. [1 ]
Bihl, Trevor J. [1 ]
机构
[1] US Air Force, Inst Technol, 2950 Hobson Way, Wright Patterson AFB, OH 45433 USA
来源
R JOURNAL | 2017年 / 9卷 / 02期
关键词
EXPLORATORY FACTOR-ANALYSIS; INTRUSION-DETECTION;
D O I
10.32614/RJ-2017-039
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
As the number of cyber-attacks continues to grow on a daily basis, so does the delay in threat detection. For instance, in 2015, the Office of Personnel Management discovered that approximately 21.5 million individual records of Federal employees and contractors had been stolen. On average, the time between an attack and its discovery is more than 200 days. In the case of the OPM breach, the attack had been going on for almost a year. Currently, cyber analysts inspect numerous potential incidents on a daily basis, but have neither the time nor the resources available to perform such a task. anomalyDetection aims to curtail the time frame in which anomalous cyber activities go unnoticed and to aid in the efficient discovery of these anomalous transactions among the millions of daily logged events by i) providing an efficient means for pre-processing and aggregating cyber data for analysis by employing a tabular vector transformation and handling multicollinearity concerns; ii) offering numerous built-in multivariate statistical functions such as Mahalanobis distance, factor analysis, principal components analysis to identify anomalous activity, iii) incorporating the pipe operator (%>%) to allow it to work well in the tidyverse workflow. Combined, anomalyDetection offers cyber analysts an efficient and simplified approach to break up network events into time-segment blocks and identify periods associated with suspected anomalies for further evaluation.
引用
收藏
页码:354 / 365
页数:12
相关论文
共 50 条
  • [31] SaRLog: Semantic-Aware Robust Log Anomaly Detection via BERT-Augmented Contrastive Learning
    Jilcha, Lelisa Adeba
    Kim, Deuk-Hun
    Kwak, Jin
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (13): : 23727 - 23736
  • [32] Distributed Systems Anomaly Detection Based on Log
    Lai, Fenggang
    Zhang, Pan
    Cheng, Ruiying
    Xu, Peng
    2021 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES FOR DISASTER MANAGEMENT (ICT-DM), 2021, : 72 - 79
  • [33] A Generative Adversarial Networks for Log Anomaly Detection
    Duan, Xiaoyu
    Ying, Shi
    Yuan, Wanli
    Cheng, Hailong
    Yin, Xiang
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2021, 37 (01): : 135 - 148
  • [34] Robust Log-Based Anomaly Detection on Unstable Log Data
    Zhang, Xu
    Xu, Yong
    Lin, Qingwei
    Qiao, Bo
    Zhang, Hongyu
    Dang, Yingnong
    Xie, Chunyu
    Yang, Xinsheng
    Cheng, Qian
    Li, Ze
    Chen, Junjie
    He, Xiaoting
    Yao, Randolph
    Lou, Jian-Guang
    Chintalapati, Murali
    Shen, Furao
    Zhang, Dongmei
    ESEC/FSE'2019: PROCEEDINGS OF THE 2019 27TH ACM JOINT MEETING ON EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING, 2019, : 807 - 817
  • [35] LogBERT: Log Anomaly Detection via BERT
    Guo, Haixuan
    Yuan, Shuhan
    Wu, Xintao
    2021 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2021,
  • [36] An Intelligent Framework for Log Anomaly Detection Based on Log Template Extraction
    Pan, Lei
    Zhu, Huichang
    JOURNAL OF CASES ON INFORMATION TECHNOLOGY, 2023, 25 (01)
  • [37] Memory-Augmented Spatial-Temporal Consistency Network for Video Anomaly Detection
    Li, Zhangxun
    Zhao, Mengyang
    Zeng, Xinhua
    Wang, Tian
    Pang, Chengxin
    PATTERN RECOGNITION AND COMPUTER VISION, PRCV 2023, PT VI, 2024, 14430 : 95 - 107
  • [38] Improving Network Security through Traffic Log Anomaly Detection Using Time Series Analysis
    Rodriguez, Aitor Corchero
    de los Mozos, Mario Reyes
    COMPUTATIONAL INTELLIGENCE IN SECURITY FOR INFORMATION SYSTEMS 2010, 2010, 85 : 125 - 133
  • [39] Unsupervised Anomaly Detection with a GAN Augmented Autoencoder
    Rafiee, Laya
    Fevens, Thomas
    ARTIFICIAL NEURAL NETWORKS AND MACHINE LEARNING, ICANN 2020, PT I, 2020, 12396 : 479 - 490
  • [40] ADELE: Anomaly Detection from Event Log Empiricism
    Khatuya, Subhendu
    Ganguly, Niloy
    Basak, Jayanta
    Bharde, Madhumita
    Mitra, Bivas
    IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2018), 2018, : 2123 - 2131