Due to a constant increase in the number of connected devices and there is an increased demand for confidentiality, availability, and integrity on applications. This thesis was focused on unsupervised anomaly detection in data centers. It evaluates how suitable open source state-of-the-art solutions are at finding abnormal trends and patterns in log-based data streams. The methods used in this work are Principal component analysis (PCA), LogCluster, and Hierarchical temporal memory (HTM). They were evaluated using F-score on a real data set from an Apache access log. The data set was carefully chosen to represent a normal state in which close to no anomalous events occurred. Af- terward, 0.5% of the data points were transformed into anomalo...
Anomaly detection in time series is a broad field with many application areas, and has been research...
Complex computer systems are often prone to anomalous or erroneous behavior, which can lead to costl...
In this thesis, the use of unsupervised and semi-supervised machine learning techniques was analyzed...
Due to a constant increase in the number of connected devices and there is an increased demand for c...
Anomaly detection has attracted the attention of researchers from a variety of backgrounds as it fin...
Many software systems are under test to ensure that they function as expected. Sometimes, a test can...
Logging security-related events is becoming increasingly important for companies. Log messages can b...
In this degree project, we study the anomaly detection problem in log files of computer networks. In...
This thesis deals with anomaly detection of log data. Big software systems produce a great amount of...
The goal of this study is to develop effective methods for detecting anomalies in Linux Syslog colle...
Unsupervised anomaly detection algorithms are applied with the purpose of identifying performance re...
In recent years due to rapid growth of information technology and easy access to computers, digital ...
Following the significant transition from the traditional production industry to an informationbased...
İşletmelerdeki siber güvenlik açıklarının ve veri sızıntılarının büyük bir bölümüne iç aktörler sebe...
In this thesis, the red hot topic anomaly detection is studied, which is a subtopic in machine learn...
Anomaly detection in time series is a broad field with many application areas, and has been research...
Complex computer systems are often prone to anomalous or erroneous behavior, which can lead to costl...
In this thesis, the use of unsupervised and semi-supervised machine learning techniques was analyzed...
Due to a constant increase in the number of connected devices and there is an increased demand for c...
Anomaly detection has attracted the attention of researchers from a variety of backgrounds as it fin...
Many software systems are under test to ensure that they function as expected. Sometimes, a test can...
Logging security-related events is becoming increasingly important for companies. Log messages can b...
In this degree project, we study the anomaly detection problem in log files of computer networks. In...
This thesis deals with anomaly detection of log data. Big software systems produce a great amount of...
The goal of this study is to develop effective methods for detecting anomalies in Linux Syslog colle...
Unsupervised anomaly detection algorithms are applied with the purpose of identifying performance re...
In recent years due to rapid growth of information technology and easy access to computers, digital ...
Following the significant transition from the traditional production industry to an informationbased...
İşletmelerdeki siber güvenlik açıklarının ve veri sızıntılarının büyük bir bölümüne iç aktörler sebe...
In this thesis, the red hot topic anomaly detection is studied, which is a subtopic in machine learn...
Anomaly detection in time series is a broad field with many application areas, and has been research...
Complex computer systems are often prone to anomalous or erroneous behavior, which can lead to costl...
In this thesis, the use of unsupervised and semi-supervised machine learning techniques was analyzed...