Iterative Selection of Categorical Variables for Log Data Anomaly Detection

被引:4
|
作者
Landauer, Max [1 ]
Hoeld, Georg [1 ]
Wurzenberger, Markus [1 ]
Skopik, Florian [1 ]
Rauber, Andreas [2 ]
机构
[1] Austrian Inst Technol, Giefinggasse 4, Vienna, Austria
[2] Vienna Univ Technol, Favoritenstr 9-11, Vienna, Austria
来源
COMPUTER SECURITY - ESORICS 2021, PT I | 2021年 / 12972卷
基金
欧盟地平线“2020”;
关键词
OUTLIERS;
D O I
10.1007/978-3-030-88418-5_36
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Log data is a well-known source for anomaly detection in cyber security. Accordingly, a large number of approaches based on self-learning algorithms have been proposed in the past. Most of these approaches focus on numeric features extracted from logs, since these variables are convenient to use with commonly known machine learning techniques. However, system log data frequently involves multiple categorical features that provide further insights into the state of a computer system and thus have the potential to improve detection accuracy. Unfortunately, it is non-trivial to derive useful correlation rules from the vast number of possible values of all available categorical variables. Therefore, we propose the Variable Correlation Detector (VCD) that employs a sequence of selection constraints to efficiently disclose pairs of variables with correlating values. The approach also comprises of an online mode that continuously updates the identified variable correlations to account for system evolution and applies statistical tests on conditional occurrence probabilities for anomaly detection. Our evaluations show that the VCD is well adjustable to fit properties of the data at hand and discloses associated variables with high accuracy. Our experiments with real log data indicate that the VCD is capable of detecting attacks such as scans and brute-force intrusions with higher accuracy than existing detectors.
引用
收藏
页码:757 / 777
页数:21
相关论文
共 50 条
  • [31] Log anomaly detection based on BERT
    Tang, Pan
    Guan, Yepeng
    SIGNAL IMAGE AND VIDEO PROCESSING, 2024, 18 (8-9) : 6431 - 6441
  • [32] Metric selection and anomaly detection for cloud operations using log and metric correlation analysis
    Farshchi, Mostafa
    Schneider, Jean-Guy
    Weber, Ingo
    Grundy, John
    JOURNAL OF SYSTEMS AND SOFTWARE, 2018, 137 : 531 - 549
  • [33] A framework for data anomaly detection based on iterative optimization in IoT systems
    Wang, Zhongmin
    Wei, Zhihao
    Gao, Cong
    Chen, Yanping
    Wang, Fengwei
    COMPUTING, 2023, 105 (11) : 2337 - 2362
  • [34] An Iterative Method for Unsupervised Robust Anomaly Detection Under Data Contamination
    Kim, Minkyung
    Yu, Jongmin
    Kim, Junsik
    Oh, Tae-Hyun
    Choi, Jun Kyun
    IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2024, 35 (10) : 13327 - 13339
  • [35] A framework for data anomaly detection based on iterative optimization in IoT systems
    Zhongmin Wang
    Zhihao Wei
    Cong Gao
    Yanping Chen
    Fengwei Wang
    Computing, 2023, 105 : 2337 - 2362
  • [36] Analyzing change in categorical variables by generalized log-linear models
    Croon, MA
    Bergsma, W
    Hagenaars, JA
    SOCIOLOGICAL METHODS & RESEARCH, 2000, 29 (02) : 195 - 229
  • [37] Utility Analysis about Log Data Anomaly Detection Based on Federated Learning
    Shin, Tae-Ho
    Kim, Soo-Hyung
    APPLIED SCIENCES-BASEL, 2023, 13 (07):
  • [38] Incremental Clustering for Semi-Supervised Anomaly Detection applied on Log Data
    Wurzenberger, Markus
    Skopik, Florian
    Landauer, Max
    Greitbauer, Philipp
    Fiedler, Roman
    Kastner, Wolfgang
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,
  • [39] Hybrid Big Data Architecture for High-Speed Log Anomaly Detection
    Tangsatjatham, Pittayut
    Nupairoj, Natawut
    2016 13TH INTERNATIONAL JOINT CONFERENCE ON COMPUTER SCIENCE AND SOFTWARE ENGINEERING (JCSSE), 2016, : 538 - 543
  • [40] Leveraging Log Instructions in Log-based Anomaly Detection
    Bogatinovski, Jasmin
    Madjarov, Gjorgji
    Nedelkoski, Sasho
    Cardoso, Jorge
    Kao, Odej
    2022 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING (IEEE SCC 2022), 2022, : 321 - 326