anomalyDetection: Implementation of Augmented Network Log Anomaly Detection Procedures

被引:7
|
作者
Gutierrez, Robert J. [1 ]
Boehmke, Bradley C. [1 ]
Bauer, Kenneth W. [1 ]
Saie, Cade M. [1 ]
Bihl, Trevor J. [1 ]
机构
[1] US Air Force, Inst Technol, 2950 Hobson Way, Wright Patterson AFB, OH 45433 USA
来源
R JOURNAL | 2017年 / 9卷 / 02期
关键词
EXPLORATORY FACTOR-ANALYSIS; INTRUSION-DETECTION;
D O I
10.32614/RJ-2017-039
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
As the number of cyber-attacks continues to grow on a daily basis, so does the delay in threat detection. For instance, in 2015, the Office of Personnel Management discovered that approximately 21.5 million individual records of Federal employees and contractors had been stolen. On average, the time between an attack and its discovery is more than 200 days. In the case of the OPM breach, the attack had been going on for almost a year. Currently, cyber analysts inspect numerous potential incidents on a daily basis, but have neither the time nor the resources available to perform such a task. anomalyDetection aims to curtail the time frame in which anomalous cyber activities go unnoticed and to aid in the efficient discovery of these anomalous transactions among the millions of daily logged events by i) providing an efficient means for pre-processing and aggregating cyber data for analysis by employing a tabular vector transformation and handling multicollinearity concerns; ii) offering numerous built-in multivariate statistical functions such as Mahalanobis distance, factor analysis, principal components analysis to identify anomalous activity, iii) incorporating the pipe operator (%>%) to allow it to work well in the tidyverse workflow. Combined, anomalyDetection offers cyber analysts an efficient and simplified approach to break up network events into time-segment blocks and identify periods associated with suspected anomalies for further evaluation.
引用
收藏
页码:354 / 365
页数:12
相关论文
共 50 条
  • [41] Two Class Pruned Log Message Anomaly Detection
    Farzad A.
    Gulliver T.A.
    SN Computer Science, 2021, 2 (5)
  • [42] Review on Log-Based Anomaly Detection Techniques
    Raut, Pooja
    Mishra, Akanksha
    Rao, Shreya
    Kawoor, Saloni
    Shelke, Sushila
    Deore, Mahendra
    Kumar, Vivek
    PROCEEDINGS OF SECOND INTERNATIONAL CONFERENCE ON SUSTAINABLE EXPERT SYSTEMS (ICSES 2021), 2022, 351 : 893 - 906
  • [43] Anomaly Detection and Root Cause Analysis on Log Data
    Pasha, Daem
    Shah, Ali Hussain
    Zadeh, Esmaeil Habib
    Konur, Savas
    ARTIFICIAL INTELLIGENCE XXXIX, AI 2022, 2022, 13652 : 333 - 339
  • [44] InterpretableSAD: Interpretable Anomaly Detection in Sequential Log Data
    Han, Xiao
    Cheng, He
    Xu, Depeng
    Yuan, Shuhan
    2021 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2021, : 1183 - 1192
  • [45] Log summarization and anomaly detection for troubleshooting distributed systems
    Gunter, Dan
    Tierney, Brian L.
    Brown, Aaron
    Swany, Martin
    Bresnahan, John
    Schopf, Jennifer M.
    2007 8TH IEEE/ACM INTERNATIONAL CONFERENCE ON GRID COMPUTING, 2007, : 41 - +
  • [46] Behavioral Anomaly Detection Approach Based on Log Monitoring
    Du, Sizhong
    Cao, Jian
    PROCEEDINGS OF 2015 IEEE INTERNATIONAL CONFERENCE ON BEHAVIORAL, ECONOMIC, SOCIO-CULTURAL COMPUTING (BESC), 2015, : 188 - 194
  • [47] A MODEL FOR WEBSITE ANOMALY DETECTION BASED ON LOG ANALYSIS
    Han, Xu
    Lv, Tao
    Wei, Lin
    Wu, Yanyan
    Liu, Jianyi
    Wang, Cong
    2014 IEEE 3rd International Conference on Cloud Computing and Intelligence Systems (CCIS), 2014, : 604 - 608
  • [48] LogSpy: System Log Anomaly Detection for Distributed Systems
    Li, Haoming
    Li, Yuguo
    2020 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND COMPUTER ENGINEERING (ICAICE 2020), 2020, : 347 - 352
  • [49] Logformer: Cascaded Transformer for System Log Anomaly Detection
    Hang, Feilu
    Guo, Wei
    Chen, Hexiong
    Xie, Linjiang
    Zhou, Chenghao
    Liu, Yao
    CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES, 2023, 136 (01): : 517 - 529
  • [50] Deep learning for anomaly detection in log data: A survey
    Landauer, Max
    Onder, Sebastian
    Skopik, Florian
    Wurzenberger, Markus
    MACHINE LEARNING WITH APPLICATIONS, 2023, 12