MM Alani - Journal of Reliable Intelligent Environments, 2021 - Springer
With over 4.57 billion people using the Internet in 2020, the amount of data being generated has exceeded 2.5 quintillion bytes per day. This rapid increase in the generation of data has …
The use of system logs for detecting and troubleshooting anomalies of production systems has been known since the early days of computers. In spite of the advances in the area, the …
X Feng, H Xia, S Xu, L Xu, R Zhang - Expert Systems with Applications, 2023 - Elsevier
The lack of effective defense resource allocation strategies and reliable multi-agent collaboration mechanisms lead to the low stability of Deep Reinforcement Learning (DRL) …
This paper describes a study on log mining in the domain of microservices technologies. We focus on the detection of anomalies from logs, ie, events requiring deeper inspection by …
C Feltus - International Journal of Systems and Software Security …, 2022 - igi-global.com
Artificial intelligence and machine learning have recently made outstanding contributions to the performance of information system and cyber--physical system security. There has been …
D Torre, F Mesadieu, A Chennamaneni - Empirical Software Engineering, 2023 - Springer
Context Recent years have seen a lot of attention into Deep Learning (DL) techniques used to detect cybersecurity attacks. DL techniques can swiftly analyze massive datasets, and …
Due to the complexity of modern IT services, failures can be manifold, occur at any stage, and are hard to detect. For this reason, anomaly detection applied to monitoring data such …
Zero trust architecture (ZTA) is a paradigm shift in how we protect data, stay connected and access resources. ZTA is non-perimeter-based defence, which has been emerging as a …
M Li, M Sun, G Li, D Han, M Zhou - Applied Sciences, 2023 - mdpi.com
Effective log anomaly detection can help operators locate and solve problems quickly, ensure the rapid recovery of the system, and reduce economic losses. However, recent log …