T Zhang, H Qiu, G Castellano, M Rifai… - … on Knowledge and …, 2023 - ieeexplore.ieee.org
Modern information and communication systems have become increasingly challenging to manage. The ubiquitous system logs contain plentiful information and are thus widely …
Log lines consist of static parts that characterize their structure and enable assignment of event types, and event parameters, ie, variable parts that provide specific information on …
Prudent event monitoring and logging are the only means that allow system operators and security teams to truly understand how complex systems are utilized. Log data are essential …
Log files give insight into the state of a computer system and enable the detection of anomalous events relevant to cyber security. However, automatically analyzing log data is …
For many years signature-based intrusion detection has been applied to discover known malware and attack vectors. However, with the advent of malware toolboxes, obfuscation …
This thesis explores a programatic method for deidentifying organizational cyber event data into functional training sets suitable for cyber security research and skills development. A 4 …
Log line clusters usually lack meaningful descriptions that are required to understand the information provided by log lines within a cluster. Template generators allow to produce …