In this work, we explore approaches for detecting anomalies in system event logs. We define the system log anomaly detection problem and research existing methods. We apply the methods to a practical task of detecting anomalous events in logs of file behavior analysis sandbox. To validate results and compare methods we calculate quality metrics on a manually labeled dataset. First, we try an approach based on calculating event document frequency and use it as a baseline. We improve it by creating an event normalization algorithm and significantly reducing the number of false positives. After that, we implement a different approach that involves extracting event features and training random forest and logistic regression models to model a pr...
Business processes are prone to subtle changes over time, as unwanted behavior slowly manifests in t...
We present a novel information-theoretic framework to detect anomalous traces in business process ev...
Log data, produced from every computer system and program, are widely used as source of valuable inf...
Context: Log files are produced in most larger computer systems today which contain highly valuable ...
Context: Log files are produced in most larger computer systems today which contain highly valuable ...
The presence of anomalous information in a business process event log, such as missing, duplicated o...
We describe research into the identification of anomalous events and event patterns as manifested in...
Logs generated by the applications, devices, and servers contain information that can be used to det...
With the increase of network virtualization and the disparity of vendors, the continuous monitoring ...
With the increase of network virtualization and the disparity of vendors, the continuous monitoring ...
With the increase of network virtualization and the disparity of vendors, the continuous monitoring ...
With the increase of network virtualization and the disparity of vendors, the continuous monitoring ...
This paper discusses four algorithms for detecting anomalies in logs of process aware systems. One o...
This paper discusses four algorithms for detecting anomalies in logs of process aware systems. One o...
Logs generated by the applications, devices, and servers contain information that can be used to det...
Business processes are prone to subtle changes over time, as unwanted behavior slowly manifests in t...
We present a novel information-theoretic framework to detect anomalous traces in business process ev...
Log data, produced from every computer system and program, are widely used as source of valuable inf...
Context: Log files are produced in most larger computer systems today which contain highly valuable ...
Context: Log files are produced in most larger computer systems today which contain highly valuable ...
The presence of anomalous information in a business process event log, such as missing, duplicated o...
We describe research into the identification of anomalous events and event patterns as manifested in...
Logs generated by the applications, devices, and servers contain information that can be used to det...
With the increase of network virtualization and the disparity of vendors, the continuous monitoring ...
With the increase of network virtualization and the disparity of vendors, the continuous monitoring ...
With the increase of network virtualization and the disparity of vendors, the continuous monitoring ...
With the increase of network virtualization and the disparity of vendors, the continuous monitoring ...
This paper discusses four algorithms for detecting anomalies in logs of process aware systems. One o...
This paper discusses four algorithms for detecting anomalies in logs of process aware systems. One o...
Logs generated by the applications, devices, and servers contain information that can be used to det...
Business processes are prone to subtle changes over time, as unwanted behavior slowly manifests in t...
We present a novel information-theoretic framework to detect anomalous traces in business process ev...
Log data, produced from every computer system and program, are widely used as source of valuable inf...