Robust procedural learning for anomaly detection and observability in 5G RAN

T Sundqvist, M Bhuyan… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Most existing large distributed systems have poor observability and cannot use the full
potential of machine learning-based behavior analysis. The system logs, which contain the …

Software Failure Log Analysis for Engineers

W Dobrowolski, M Nikodem, O Unold - Electronics, 2023 - mdpi.com
The use of automated methods for log analysis is unavoidable in any large company;
therefore, it has attracted attention from engineers and researchers. As a result, the number …

Transformer-based Sentiment Analysis for Anomaly Detection on Drone Forensic Timeline

S Silalahi, T Ahmad… - 2023 11th International …, 2023 - ieeexplore.ieee.org
An IoT device such as a drone is constantly generating log records to store every event that
happens to the drone during a flight. In case the drone encounters a problem or experiences …

[HTML][HTML] Analysis of statistical properties of variables in log data for advanced anomaly detection in cyber security

M Wurzenberger, G Höld, M Landauer, F Skopik - Computers & Security, 2024 - Elsevier
Log lines consist of static parts that characterize their structure and enable assignment of
event types, and event parameters, ie, variable parts that provide specific information on …

Deterministic attribute selection for isolation forest

Ł Gałka, P Karczmarek - Pattern Recognition, 2024 - Elsevier
Modern data mining techniques have been gained importance in recent years. In particular,
anomaly detection algorithms, applied in key sectors of information technology, have been …

Severity-oriented Multiclass Drone Flight Logs Anomaly Detection

S Silalahi, T Ahmad, H Studiawan, E Anthi… - IEEE …, 2024 - ieeexplore.ieee.org
The availability of log data recorded by computer-based systems such as operating system
and network logs, makes it possible for the stakeholder to look after the system for …

MultiNetAD: Multiplex Network-Based Anomaly Access Detection Featuring Semantic Hierarchies

Z Yuan, Q Sun, H Zhou, Z Zhu, J Li - Proceedings of the 2024 SIAM …, 2024 - SIAM
Conventional anomaly access detection frameworks typically utilize all attribute fields to
collectively embed them into a unified space to detect various types of anomaly accesses …

Drone Flight Log Anomaly Severity Classification via Sentence Embedding

S Silalahi, T Ahmad… - … Conference on Artificial …, 2023 - ieeexplore.ieee.org
Log-based anomaly detection is one of the popular research topics in the cybersecurity
domain. Typically, the log event classification target is only separated into two classes …

Machine learning-based diagnostics and observability in mobile networks

T Sundqvist - 2023 - diva-portal.org
To meet the high-performance and reliability demands of 5G, the Radio Access Network
(RAN) is moving to a cloud-native architecture. The new microservice architecture promises …

A Multi-feature Fusion Method for Web Scanning Behavior Detection in Online Web Logs

Q Zhao, B Liu, H Wu, Z Zhang, R Hu… - … on Computers and …, 2023 - ieeexplore.ieee.org
Web scanning is generally a precursor of a malicious cyber-attack chain to discover system
security vulnerabilities. The success or failure of a web attack is generally dependent on the …