The project investigates the nature of database connection logs by analysing these logs for potential anomalies. We apply different models to the data in building an ensemble of classifiers that is able to flag potentially anomalous or malicious connections to the database instances within the CERN network. Further, we also utilise this research to shed light on usage patterns within the network in order to better understand the temporal dependencies and implement them in the decision-making process within the CERN system. These models are trained on subsets of a data lake that comprises daily connection logs across all instances of databases on the network. The data lake comprises Javascript Object Notation (JSON) logs that may be visual...
Background: With the advent of the information age, there are many large numbers of services rising ...
UnrestrictedAn important research problem in knowledge discovery and data mining is to identify abno...
The overall purpose of this project was to find anomalies inunstructured console logs. Logs were gen...
In this degree project, we study the anomaly detection problem in log files of computer networks. In...
For several years CERN has been offering a centralised service for Elasticsearch, a popular distribu...
Most intrusion detection approaches rely on the analysis of the packet logs recording each noticeabl...
Database Operating System (DBOS) is a new operating system (OS) framework that replaces the traditio...
Anomaly detection in the CERN OpenStack cloud is a challenging task due to the large scale of the co...
As distributed storage systems become central to business operations, increasing their reliability b...
As the volume of data recorded from systems increases, there is a need to effectively analyse this d...
Insider attacks aiming at stealing data are highly common, according to recent studies, and they are...
Complex software systems are continuously generating application and server logs for the events whic...
With the increase of network virtualization and the disparity of vendors, the continuous monitoring ...
Many applications within the Flexyz network generate a lot of log data. This data used to be difficu...
Context: Log files are produced in most larger computer systems today which contain highly valuable ...
Background: With the advent of the information age, there are many large numbers of services rising ...
UnrestrictedAn important research problem in knowledge discovery and data mining is to identify abno...
The overall purpose of this project was to find anomalies inunstructured console logs. Logs were gen...
In this degree project, we study the anomaly detection problem in log files of computer networks. In...
For several years CERN has been offering a centralised service for Elasticsearch, a popular distribu...
Most intrusion detection approaches rely on the analysis of the packet logs recording each noticeabl...
Database Operating System (DBOS) is a new operating system (OS) framework that replaces the traditio...
Anomaly detection in the CERN OpenStack cloud is a challenging task due to the large scale of the co...
As distributed storage systems become central to business operations, increasing their reliability b...
As the volume of data recorded from systems increases, there is a need to effectively analyse this d...
Insider attacks aiming at stealing data are highly common, according to recent studies, and they are...
Complex software systems are continuously generating application and server logs for the events whic...
With the increase of network virtualization and the disparity of vendors, the continuous monitoring ...
Many applications within the Flexyz network generate a lot of log data. This data used to be difficu...
Context: Log files are produced in most larger computer systems today which contain highly valuable ...
Background: With the advent of the information age, there are many large numbers of services rising ...
UnrestrictedAn important research problem in knowledge discovery and data mining is to identify abno...
The overall purpose of this project was to find anomalies inunstructured console logs. Logs were gen...