دورية أكاديمية

Anomaly Detection in Cyber Security with Graph-Based LSTM in Log Analysis.

التفاصيل البيبلوغرافية
العنوان: Anomaly Detection in Cyber Security with Graph-Based LSTM in Log Analysis.
المؤلفون: Alaca, Yusuf, Çelik, Yüksel, Goel, Sanjay
المصدر: Chaos Theory & Applications (CHTA); Nov2023, Vol. 5 Issue 3, p188-197, 10p
مصطلحات موضوعية: ANOMALY detection (Computer security), INTERNET security, INTRUSION detection systems (Computer security), MACHINE learning, DEEP learning, ARTIFICIAL intelligence, DATA logging
مستخلص: Intrusion detection systems utilize the analysis of log data to effectively detect anomalies. However, detecting anomalies quickly and effectively in large and heterogeneous log data can be challenging. To address this difficulty, this study proposes the GLSTM (Graph-based Long Short-Term Memory) framework, a graph-based deep learning model that analyzes log data to detect cyber-attacks rapidly and effectively. The framework involves standardizing the complex and diverse log data, training this data on an artificial intelligence model, and detecting anomalies. Initially, the complex and diverse log data is transformed into graph data using Node2Vec, enabling efficient and rapid analysis on the artificial intelligence model. Subsequently, these graph data are trained using LSTM (Long Short-Term Memory), Bi-LSTM, and GRU(Gated Recurrent Unit) deep learning algorithms. The proposed framework is tested using Hadoop's HDFS dataset, collected from different systems and heterogeneous sources, as well as the BGL and IMDB datasets. Experimental results on the selected datasets demonstrate high levels of success. [ABSTRACT FROM AUTHOR]
Copyright of Chaos Theory & Applications (CHTA) is the property of Chaos Theory & Applications (CHTA) and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
قاعدة البيانات: Complementary Index