Improving anomaly detection event analysis using the EventRank algorithm

被引:0
|
作者
Begnum, Kyrre [1 ]
Burgess, Mark [1 ]
机构
[1] Oslo Univ Coll, Oslo, Norway
来源
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We discuss an approach to reducing the number of events accepted by anomaly detection systems, based on alternative schemes for interest-ranking. The basic assumption is that regular and periodic usage of a system will yield patterns of events that can be learned by data-mining. Events that deviate from this pattern can then be filtered out and receive special attention. Our approach compares the anomaly detection framework from Cfengine and the EventRank algorithm for the analysis of the event logs. We show that the EventRank algorithm can be used to successfully prune periodic events from real-life data.
引用
收藏
页码:145 / +
页数:2
相关论文
共 50 条
  • [41] Target Detection Using the Background Model from the Topological Anomaly Detection Algorithm
    Munoz, Leidy P. Dorado
    Messinger, David W.
    Ziemann, Amanda K.
    ALGORITHMS AND TECHNOLOGIES FOR MULTISPECTRAL, HYPERSPECTRAL, AND ULTRASPECTRAL IMAGERY XIX, 2013, 8743
  • [42] Heat illness detection with heart rate variability analysis and anomaly detection algorithm
    Fujiwara, Koichi
    Ota, Koshi
    Saeda, Shota
    Yamakawa, Toshitaka
    Kubo, Takatomi
    Yamamoto, Aozora
    Maruno, Yuki
    Kano, Manabu
    BIOMEDICAL SIGNAL PROCESSING AND CONTROL, 2024, 87
  • [43] Anomaly detection of event sequences using multiple temporal resolutions and Markov chains
    Boldt, Martin
    Borg, Anton
    Ickin, Selim
    Gustafsson, Jorgen
    KNOWLEDGE AND INFORMATION SYSTEMS, 2020, 62 (02) : 669 - 686
  • [44] Anomaly detection algorithm for business process control flow based on event log: Status and evaluation
    Fu, Jianping
    Zhao, Haiyan
    Cao, Jian
    Chen, Qingkui
    Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS, 2024, 30 (08): : 2631 - 2643
  • [45] Event-level Anomaly Detection on Software logs: Role of Algorithm, Threshold, and Window Size
    Nyyssola, Jesse
    Mantyla, Mika
    2024 IEEE 24TH INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY, QRS, 2024, : 649 - 656
  • [46] Background Subtraction Algorithm and Image Skeletonization based Anomaly Event detection for Low Resolution Video
    Murugan, V.
    Vijaykumar, V. R.
    Selvan, S. Vijaya
    2017 FOURTH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMMUNICATION AND NETWORKING (ICSCN), 2017,
  • [47] Anomaly detection of event sequences using multiple temporal resolutions and Markov chains
    Martin Boldt
    Anton Borg
    Selim Ickin
    Jörgen Gustafsson
    Knowledge and Information Systems, 2020, 62 : 669 - 686
  • [48] A novel immune detection algorithm for anomaly detection
    Zhang, YJ
    2005 IEEE INTERNATIONAL SYMPOSIUM ON INTELLIGENT CONTROL & 13TH MEDITERRANEAN CONFERENCE ON CONTROL AND AUTOMATION, VOLS 1 AND 2, 2005, : 1441 - 1446
  • [49] Perspectives on Anomaly and Event Detection in Exascale Systems
    Iuhasz, Gabriel
    Petcu, Dana
    2019 IEEE 5TH INTL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY) / IEEE INTL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC) / IEEE INTL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2019, : 225 - 229
  • [50] Gene immune detection algorithm for anomaly detection
    Zhang, Yajing
    Jisuanji Gongcheng/Computer Engineering, 2006, 32 (03): : 151 - 153