System log parsing: A survey

T Zhang, H Qiu, G Castellano, M Rifai… - … on Knowledge and …, 2023 - ieeexplore.ieee.org
Modern information and communication systems have become increasingly challenging to
manage. The ubiquitous system logs contain plentiful information and are thus widely …

Anomaly Detection in Key-Management Activities Using Metadata: A Case Study and Framework

MAR Baee, L Simpson… - IEEE Open Journal of the …, 2024 - ieeexplore.ieee.org
Large scale enterprise networks often use Enterprise Key-Management (EKM) platforms for
unified management of cryptographic keys. Monitoring access and usage patterns of EKM …

Anomaly Detection in the Key-Management Interoperability Protocol Using Metadata

MAR Baee, L Simpson… - IEEE Open Journal of the …, 2024 - ieeexplore.ieee.org
Large scale enterprise networks often use Enterprise Key-Management (EKM) platforms for
unified management of cryptographic keys. In such a system, requests and responses …

Detecting unknown cyber security attacks through system behavior analysis

F Skopik, M Wurzenberger, M Landauer - Cybersecurity of Digital Service …, 2022 - Springer
For many years signature-based intrusion detection has been applied to discover known
malware and attack vectors. However, with the advent of malware toolboxes, obfuscation …

Log message with JSON item count for root cause analysis in microservices

T Koyama, T Kushida - 2023 6th Conference on Cloud and …, 2023 - ieeexplore.ieee.org
System administrator takes time to find application error in one microservice caused by
HTTP response from another microservice. Although Istio default log message includes the …

[PDF][PDF] Trabajo de Fin de Grado

JA Gonzalez - … Universidad Valladolid, Facultad de Enfermería de …, 2016 - e-archivo.uc3m.es
Justo ahora no puedo evitar acordarme de todo el esfuerzo y trabajo dedicado a lo largo de
los cuatro años que ha durado mi formación universitaria. Ha sido un camino difícil y lleno …

[图书][B] A Visual Analytics Exploratory and Predictive Framework for Anomaly Detection in Multi-fidelity Machine Log Data

FNU Shilpika - 2023 - search.proquest.com
Maintaining robust and reliable computing systems, especially those that enable
breakthrough work in computational science and engineering research, is a critical and …

[图书][B] Machine Learning for Non-Invasive Cyber Insurance Adversarial Underwriting

K Nagou - 2024 - search.proquest.com
In light of the growing dependence on digital technology, organizations are prone to
cyberattacks that cannot be entirely mitigated, hence precluding the attainment of absolute …

A Multi-feature Fusion Method for Web Scanning Behavior Detection in Online Web Logs

Q Zhao, B Liu, H Wu, Z Zhang, R Hu… - … on Computers and …, 2023 - ieeexplore.ieee.org
Web scanning is generally a precursor of a malicious cyber-attack chain to discover system
security vulnerabilities. The success or failure of a web attack is generally dependent on the …

Online Log Analysis (OLA) for Malicious User Activities

P Muse, H Stanly - 2023 2nd International Conference on …, 2023 - ieeexplore.ieee.org
Efficient log analysis involves collecting, evaluating, and managing raw data from computer-
generated records. As security vulnerabilities increase, the analysis of logs has become vital …