A critical review of common log data sets used for evaluation of sequence-based anomaly detection techniques

M Landauer, F Skopik, M Wurzenberger - Proceedings of the ACM on …, 2024 - dl.acm.org
Log data store event execution patterns that correspond to underlying workflows of systems
or applications. While most logs are informative, log data also include artifacts that indicate …

[HTML][HTML] Analysis of statistical properties of variables in log data for advanced anomaly detection in cyber security

M Wurzenberger, G Höld, M Landauer, F Skopik - Computers & Security, 2024 - Elsevier
Log lines consist of static parts that characterize their structure and enable assignment of
event types, and event parameters, ie, variable parts that provide specific information on …

[HTML][HTML] Adaptive monitoring, detection, and response for agile digital service chains

M Repetto - Computers & Security, 2023 - Elsevier
Modern business is increasingly adopting fully-digital workflows composed of
complementary services (in terms of infrastructures, software, networks, data and devices) …

Introducing a new alert data set for multi-step attack analysis

M Landauer, F Skopik, M Wurzenberger - Proceedings of the 17th Cyber …, 2024 - dl.acm.org
Intrusion detection systems (IDS) reinforce cyber defense by autonomously monitoring
various data sources for traces of attacks. However, IDSs are also infamous for frequently …

Applying Automatic System Log Analysis to Industrial Automation Systems for IoT Integration

P Bellagente, A Flammini, A Depari… - … on Metrology for …, 2023 - ieeexplore.ieee.org
Retrieving system logs is one of the main sources of information about system operation and
a widespread solution adopted in computer science for control management and …

Autoencoder-based intrusion detection in critical infrastructures

HC Altunay, Z Albayrak, M Çakmak - Current Trends in Computing, 2024 - dergipark.org.tr
Securing critical infrastructure systems such as electricity, energy, health, management,
transportation, and production facilities against cyber attacks is the issue on which states …

Survey of Intrusion Detection Techniques in Cloud Computing

SM Othman, AY Al-mutawkkil… - Sana'a University Journal …, 2024 - journals.su.edu.ye
With the continued development of cloud computing environments, security measures have
become more im-portant than ever. Intrusion detection systems (IDS) are considered one of …

On specifics of adaptive logging method implementation

I Suprunenko, V Rudnytskyi - Вісник Черкаського державного …, 2024 - er.chdtu.edu.ua
Relevancy of this work is based on the fact that having an understanding of why given code
behaves the way it does, both during normal execution and when encountering erroneous …

Semi-supervised Configuration and Optimization of Anomaly Detection Algorithms on Log Data

V Beck, M Landauer, M Wurzenberger… - … Conference on Big …, 2024 - ieeexplore.ieee.org
Cyber threats are evolving rapidly, making anomaly detection (AD) in system log data
increasingly important for detection of known and unknown attacks. The configuration of AD …

Vulnerability Assessment Pada Website Portal Manajemen Informatika Politeknik Lp3I

DE Putri - Bulletin of Network Engineer and Informatics, 2023 - neliti.com
Penelitian tentang vulnerability assessment pada website portal Manajemen Informatika
Politeknik LP3I dilakukan untuk mengidentifikasi kelemahan atau kerentanan pada website …