Landscape of automated log analysis: A systematic literature review and mapping study

Ł Korzeniowski, K Goczyła - IEEE Access, 2022 - ieeexplore.ieee.org
Logging is a common practice in software engineering to provide insights into working
systems. The main uses of log files have always been failure identification and root cause …

System log parsing: A survey

T Zhang, H Qiu, G Castellano, M Rifai… - … on Knowledge and …, 2023 - ieeexplore.ieee.org
Modern information and communication systems have become increasingly challenging to
manage. The ubiquitous system logs contain plentiful information and are thus widely …

[HTML][HTML] Analysis of statistical properties of variables in log data for advanced anomaly detection in cyber security

M Wurzenberger, G Höld, M Landauer, F Skopik - Computers & Security, 2024 - Elsevier
Log lines consist of static parts that characterize their structure and enable assignment of
event types, and event parameters, ie, variable parts that provide specific information on …

[图书][B] Smart Log Data Analytics

F Skopik, M Wurzenberger, M Landauer - 2021 - Springer
Prudent event monitoring and logging are the only means that allow system operators and
security teams to truly understand how complex systems are utilized. Log data are essential …

Survey on log clustering approaches

F Skopik, M Wurzenberger, M Landauer… - Smart Log Data …, 2021 - Springer
Log files give insight into the state of a computer system and enable the detection of
anomalous events relevant to cyber security. However, automatically analyzing log data is …

Detecting unknown cyber security attacks through system behavior analysis

F Skopik, M Wurzenberger, M Landauer - Cybersecurity of Digital Service …, 2022 - Springer
For many years signature-based intrusion detection has been applied to discover known
malware and attack vectors. However, with the advent of malware toolboxes, obfuscation …

[PDF][PDF] Security Event Log Deidentification

D Leece - 2023 - researchgate.net
This thesis explores a programatic method for deidentifying organizational cyber event data
into functional training sets suitable for cyber security research and skills development. A 4 …

ПОДХОД К ИМИТАЦИОННОМУ МОДЕЛИРОВАНИЮ ОБЪЕКТОВ КРИТИЧЕСКИ ВАЖНОЙ ИНФРАСТРУКТУРЫ ДЛЯ АНАЛИЗА КИБЕРФИЗИЧЕСКИХ АТАК

ДС Левшун - … в науке и образовании (АПИНО 2023), 2023 - elibrary.ru
Объекты критически важной инфраструктуры являются неотъемлемой частью
ключевых сфер экономики и напрямую связаны с обеспечением жизнедеятельности …

Generating Character-Based Templates for Log Data

F Skopik, M Wurzenberger, M Landauer… - Smart Log Data …, 2021 - Springer
Log line clusters usually lack meaningful descriptions that are required to understand the
information provided by log lines within a cluster. Template generators allow to produce …