[HTML][HTML] Context-based irregular activity detection in event logs for forensic investigations: An itemset mining approach

S Khan, S Parkinson, C Murphy - Expert Systems with Applications, 2023 - Elsevier
Event logs are a powerful source of digital evidence as they contain detailed information
about activities performed on a computer. Forensic investigation of the event logs is a …

Transformer-based llms in cybersecurity: An in-depth study on log anomaly detection and conversational defense mechanisms

P Balasubramanian, J Seby… - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
With the advancement of conversational AI and Large Language Models (LLMs), interactive
chatbots are emerging as pivotal assets for connecting with users across various sectors …

DLME: distributed log mining using ensemble learning for fault prediction

A Pal, M Kumar - IEEE Systems Journal, 2019 - ieeexplore.ieee.org
Fault prediction problems in network systems are often manifested as very onerous for better
network management. One of the effective measures is to constantly monitor and analyze …

User profiling in anomaly detection of authorization logs

Z Zamanian, A Feizollah, NB Anuar, LBM Kiah… - … Science and Technology …, 2019 - Springer
In digital age, the valuable asset of every company is their data. They contain personal
information, companies and industries data, sensitive government communications and a lot …

A cloud-based triage log analysis and recovery framework

G Qi, WT Tsai, W Li, Z Zhu, Y Luo - Simulation Modelling Practice and …, 2017 - Elsevier
With the development of cloud infrastructure, more and more transaction processing systems
are hosted in cloud platform. Log, that usually saves production behaviors of a transaction …

[PDF][PDF] Разработка автоматизированных методов анализа воздействий на файлы в задаче расследования инцидентов информационной безопасности …

РВ Гибилинда - 2021 - elar.urfu.ru
Актуальность темы исследования. Вступление в силу Федерального закона № 187-ФЗ
«О безопасности критической информационной инфраструктуры Российской …

LogCSS: Log anomaly detection based on BERT-CNN with context-semantics-statistics features

Z Li, X Tu, H Gao, S Huang… - Journal of Intelligent & …, 2024 - content.iospress.com
With the development of artificial intelligence, deep-learning-based log anomaly detection
proves to be an important research topic. In this paper, we propose LogCSS, a novel log …

Comparative Analysis of Pattern Mining Algorithms for Event Logs

O Gasimov, R Vaarandi… - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
During the last two decades, the mining of message patterns from textual event logs has
become an important security monitoring and system management task. A number of …

Self-regulating real-time server log monitoring using software-defined networking

A Vishnupriya, H Singh… - Proceedings of Third …, 2022 - Springer
Monitoring the real-time log is the essential practice for network auditors to take proactive
decisions. Collecting and analyzing raw log files are taking up a great deal of time. Software …

Modification of Alpha++ for discovering collaboration business processes containing non-free choice

G Ikhsan, R Sarno, KR Sungkono - 2021 IEEE Asia Pacific …, 2021 - ieeexplore.ieee.org
A business process is a series of activities or work that is structured and interrelated to solve
a problem. Business Process Model Notation (BPMN) is a standard that often use to create a …