数字经济领域系统日志异常检测

N. Shahid, M. Ali Shah
{"title":"数字经济领域系统日志异常检测","authors":"N. Shahid, M. Ali Shah","doi":"10.1049/icp.2021.2432","DOIUrl":null,"url":null,"abstract":"Anomaly detection in log file analysis is a method of automatically monitoring log files to identify suspicious activities. It plays a major role in the management of modern distributed large-scale systems. The detection of anomalies is a critical issue for data-driven systems in the digital economy. The real objective of a system log is to record the state of the system, its execution trajectory, and the important events at different critical points. System log data is a valuable and meaningful resource for understanding the status of system and performance problems; therefore, these logs are an extremely useful source for online monitoring and detection of anomalies. Simple statistical analytical techniques cannot fully capture log information for system detection of effective anomalies. In this paper, we introduce an approach of analysing the logs by combining a method of feature extraction with an anomaly detection algorithm from deep learning. For feature extraction, word2vec is used and after that, a deep autoencoder model with Long Short-Term Memory (LSTM) units is used for anomaly detection. In this process several techniques are applied to data ie principal component analysis (PCA) for dimension reduction, gaussian multivariate normal distribution to normally distributed data using mean and covariance. After detecting anomalies, the logs are further classified into different web attacks ie brute force, port scanning, sql injection and file inclusion are visualised with different graphs in the results section. The experimental findings show the effectiveness of the proposed anomaly detection learning algorithm.","PeriodicalId":254750,"journal":{"name":"Competitive Advantage in the Digital Economy (CADE 2021)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"ANOMALY DETECTION IN SYSTEM LOGS IN THE SPHERE OF DIGITAL ECONOMY\",\"authors\":\"N. Shahid, M. Ali Shah\",\"doi\":\"10.1049/icp.2021.2432\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Anomaly detection in log file analysis is a method of automatically monitoring log files to identify suspicious activities. It plays a major role in the management of modern distributed large-scale systems. The detection of anomalies is a critical issue for data-driven systems in the digital economy. The real objective of a system log is to record the state of the system, its execution trajectory, and the important events at different critical points. System log data is a valuable and meaningful resource for understanding the status of system and performance problems; therefore, these logs are an extremely useful source for online monitoring and detection of anomalies. Simple statistical analytical techniques cannot fully capture log information for system detection of effective anomalies. In this paper, we introduce an approach of analysing the logs by combining a method of feature extraction with an anomaly detection algorithm from deep learning. For feature extraction, word2vec is used and after that, a deep autoencoder model with Long Short-Term Memory (LSTM) units is used for anomaly detection. In this process several techniques are applied to data ie principal component analysis (PCA) for dimension reduction, gaussian multivariate normal distribution to normally distributed data using mean and covariance. After detecting anomalies, the logs are further classified into different web attacks ie brute force, port scanning, sql injection and file inclusion are visualised with different graphs in the results section. The experimental findings show the effectiveness of the proposed anomaly detection learning algorithm.\",\"PeriodicalId\":254750,\"journal\":{\"name\":\"Competitive Advantage in the Digital Economy (CADE 2021)\",\"volume\":\"42 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Competitive Advantage in the Digital Economy (CADE 2021)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1049/icp.2021.2432\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Competitive Advantage in the Digital Economy (CADE 2021)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1049/icp.2021.2432","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

日志文件分析中的异常检测是对日志文件进行自动监控,识别可疑活动的一种方法。它在现代分布式大型系统的管理中起着重要的作用。异常检测是数字经济中数据驱动系统的一个关键问题。系统日志的真正目的是记录系统的状态、它的执行轨迹以及不同临界点上的重要事件。系统日志数据是了解系统状态和性能问题的有价值和有意义的资源;因此,这些日志对于在线监测和检测异常非常有用。简单的统计分析技术不能完全捕获日志信息,用于系统检测有效异常。在本文中,我们介绍了一种将特征提取方法与深度学习中的异常检测算法相结合的日志分析方法。对于特征提取,使用word2vec,然后使用具有长短期记忆(LSTM)单元的深度自编码器模型进行异常检测。在这个过程中,一些技术应用于数据,如主成分分析(PCA)降维,高斯多元正态分布到正态分布的数据使用均值和协方差。在检测到异常后,将日志进一步分类为不同的web攻击,如暴力破解、端口扫描、sql注入和文件包含,并在结果部分以不同的图形显示。实验结果表明了所提异常检测学习算法的有效性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
ANOMALY DETECTION IN SYSTEM LOGS IN THE SPHERE OF DIGITAL ECONOMY
Anomaly detection in log file analysis is a method of automatically monitoring log files to identify suspicious activities. It plays a major role in the management of modern distributed large-scale systems. The detection of anomalies is a critical issue for data-driven systems in the digital economy. The real objective of a system log is to record the state of the system, its execution trajectory, and the important events at different critical points. System log data is a valuable and meaningful resource for understanding the status of system and performance problems; therefore, these logs are an extremely useful source for online monitoring and detection of anomalies. Simple statistical analytical techniques cannot fully capture log information for system detection of effective anomalies. In this paper, we introduce an approach of analysing the logs by combining a method of feature extraction with an anomaly detection algorithm from deep learning. For feature extraction, word2vec is used and after that, a deep autoencoder model with Long Short-Term Memory (LSTM) units is used for anomaly detection. In this process several techniques are applied to data ie principal component analysis (PCA) for dimension reduction, gaussian multivariate normal distribution to normally distributed data using mean and covariance. After detecting anomalies, the logs are further classified into different web attacks ie brute force, port scanning, sql injection and file inclusion are visualised with different graphs in the results section. The experimental findings show the effectiveness of the proposed anomaly detection learning algorithm.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信