Review of anomaly detection algorithms for data streams

T Lu, L Wang, X Zhao - Applied Sciences, 2023 - mdpi.com
With the rapid development of emerging technologies such as self-media, the Internet of
Things, and cloud computing, massive data applications are crossing the threshold of the …

Big data in cybersecurity: a survey of applications and future trends

MM Alani - Journal of Reliable Intelligent Environments, 2021 - Springer
With over 4.57 billion people using the Internet in 2020, the amount of data being generated
has exceeded 2.5 quintillion bytes per day. This rapid increase in the generation of data has …

AutoLog: Anomaly detection by deep autoencoding of system logs

M Catillo, A Pecchia, U Villano - Expert Systems with Applications, 2022 - Elsevier
The use of system logs for detecting and troubleshooting anomalies of production systems
has been known since the early days of computers. In spite of the advances in the area, the …

TSGS: Two-stage security game solution based on deep reinforcement learning for Internet of Things

X Feng, H Xia, S Xu, L Xu, R Zhang - Expert Systems with Applications, 2023 - Elsevier
The lack of effective defense resource allocation strategies and reliable multi-agent
collaboration mechanisms lead to the low stability of Deep Reinforcement Learning (DRL) …

[HTML][HTML] Micro2vec: Anomaly detection in microservices systems by mining numeric representations of computer logs

M Cinque, R Della Corte, A Pecchia - Journal of Network and Computer …, 2022 - Elsevier
This paper describes a study on log mining in the domain of microservices technologies. We
focus on the detection of anomalies from logs, ie, events requiring deeper inspection by …

Learning algorithm recommendation framework for IS and CPS security: Analysis of the RNN, LSTM, and GRU contributions

C Feltus - International Journal of Systems and Software Security …, 2022 - igi-global.com
Artificial intelligence and machine learning have recently made outstanding contributions to
the performance of information system and cyber--physical system security. There has been …

Deep learning techniques to detect cybersecurity attacks: a systematic mapping study

D Torre, F Mesadieu, A Chennamaneni - Empirical Software Engineering, 2023 - Springer
Context Recent years have seen a lot of attention into Deep Learning (DL) techniques used
to detect cybersecurity attacks. DL techniques can swiftly analyze massive datasets, and …

PULL: Reactive log anomaly detection based on iterative PU learning

T Wittkopp, D Scheinert, P Wiesner, A Acker… - arXiv preprint arXiv …, 2023 - arxiv.org
Due to the complexity of modern IT services, failures can be manifold, occur at any stage,
and are hard to detect. For this reason, anomaly detection applied to monitoring data such …

Automation and orchestration of zero trust architecture: Potential solutions and challenges

Y Cao, SR Pokhrel, Y Zhu, R Doss, G Li - Machine Intelligence Research, 2024 - Springer
Zero trust architecture (ZTA) is a paradigm shift in how we protect data, stay connected and
access resources. ZTA is non-perimeter-based defence, which has been emerging as a …

Mdfulog: Multi-feature deep fusion of unstable log anomaly detection model

M Li, M Sun, G Li, D Han, M Zhou - Applied Sciences, 2023 - mdpi.com
Effective log anomaly detection can help operators locate and solve problems quickly,
ensure the rapid recovery of the system, and reduce economic losses. However, recent log …