Internet of things (iot) security intelligence: a comprehensive overview, machine learning solutions and research directions

IH Sarker, AI Khan, YB Abushark, F Alsolami - Mobile Networks and …, 2023 - Springer
Abstract The Internet of Things (IoT) is one of the most widely used technologies today, and
it has a significant effect on our lives in a variety of ways, including social, commercial, and …

Machine learning for intelligent data analysis and automation in cybersecurity: current and future prospects

IH Sarker - Annals of Data Science, 2023 - Springer
Due to the digitization and Internet of Things revolutions, the present electronic world has a
wealth of cybersecurity data. Efficiently resolving cyber anomalies and attacks is becoming a …

A survey on automated log analysis for reliability engineering

S He, P He, Z Chen, T Yang, Y Su, MR Lyu - ACM computing surveys …, 2021 - dl.acm.org
Logs are semi-structured text generated by logging statements in software source code. In
recent decades, software logs have become imperative in the reliability assurance …

[HTML][HTML] Deep learning for anomaly detection in log data: A survey

M Landauer, S Onder, F Skopik… - Machine Learning with …, 2023 - Elsevier
Automatic log file analysis enables early detection of relevant incidents such as system
failures. In particular, self-learning anomaly detection techniques capture patterns in log …

Experience report: Deep learning-based system log analysis for anomaly detection

Z Chen, J Liu, W Gu, Y Su, MR Lyu - arXiv preprint arXiv:2107.05908, 2021 - arxiv.org
Logs have been an imperative resource to ensure the reliability and continuity of many
software systems, especially large-scale distributed systems. They faithfully record runtime …

[HTML][HTML] Multi-aspect rule-based AI: Methods, taxonomy, challenges and directions toward automation, intelligence and transparent cybersecurity modeling for critical …

IH Sarker, H Janicke, MA Ferrag, A Abuadbba - Internet of Things, 2024 - Elsevier
Critical infrastructure (CI) typically refers to the essential physical and virtual systems, assets,
and services that are vital for the functioning and well-being of a society, economy, or nation …

System log parsing: A survey

T Zhang, H Qiu, G Castellano, M Rifai… - … on Knowledge and …, 2023 - ieeexplore.ieee.org
Modern information and communication systems have become increasingly challenging to
manage. The ubiquitous system logs contain plentiful information and are thus widely …

Toward a sustainable cybersecurity ecosystem

S Sadik, M Ahmed, LF Sikos, AKMN Islam - Computers, 2020 - mdpi.com
Cybersecurity issues constitute a key concern of today's technology-based economies.
Cybersecurity has become a core need for providing a sustainable and safe society to …

A critical review of common log data sets used for evaluation of sequence-based anomaly detection techniques

M Landauer, F Skopik, M Wurzenberger - Proceedings of the ACM on …, 2024 - dl.acm.org
Log data store event execution patterns that correspond to underlying workflows of systems
or applications. While most logs are informative, log data also include artifacts that indicate …

Log sequence anomaly detection based on local information extraction and globally sparse transformer model

C Zhang, X Wang, H Zhang, H Zhang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Anomaly detection for log sequences is a necessary task for system intelligent operation and
fault diagnosis. In a log sequence, adjacent logs have the property of local correlation, while …