首页> 外文期刊>Computers & Security >Dynamic log file analysis: An unsupervised cluster evolution approach for anomaly detection
【24h】

Dynamic log file analysis: An unsupervised cluster evolution approach for anomaly detection

机译:动态日志文件分析:用于异常检测的无监督群集演化方法

获取原文
获取原文并翻译 | 示例
           

摘要

Technological advances and increased interconnectivity have led to a higher risk of previously unknown threats. Cyber Security therefore employs Intrusion Detection Systems that continuously monitor log lines in order to protect systems from such attacks. Existing approaches use string metrics to group similar lines into clusters and detect dissimilar lines -as outliers. However, such methods only produce static views on the data and do not sufficiently incorporate the dynamic nature of logs. Changes of the technological infrastructure therefore frequently require cluster reformations. Moreover, such approaches are not suited for detecting anomalies related to frequencies, periodic alterations and interdependencies of log lines. We therefore propose a dynamic log file anomaly detection methodology that incrementally groups log lines within time windows. Thereby, a novel clustering mechanism establishes links between otherwise isolated collections of clusters. Cluster evolution techniques analyze clusters from neighboring time windows and determine transitions such as splits or merges. A self-learning algorithm then detects anomalies in the temporal behavior of these evolving clusters by analyzing metrics derived from their developments. We apply a prototype in an illustrative scenario consisting of a log file containing known anomalies. We thereby investigate the influences of certain parameters on the detection ability and the runtime. The evaluation of this scenario shows that 61.8% of the dynamic changes of log line clusters are correctly identified, while the false alarm rate is only 0.7%. The ability of efficiently detecting these anomalies while self-adjusting to changes of the system environment suggests the applicability of the introduced approach. (C) 2018 The Authors. Published by Elsevier Ltd.
机译:技术进步和互连性增强导致以前未知威胁的风险更高。因此,网络安全使用入侵检测系统连续监视日志行,以保护系统免受此类攻击。现有方法使用字符串量度将相似的行分组为簇,并检测不相似的行作为异常值。但是,这样的方法仅产生关于数据的静态视图,而没有充分结合日志的动态性质。因此,技术基础架构的变化经常需要集群改革。而且,这样的方法不适合于检测与测井线的频率,周期性变化和相互依赖性有关的异常。因此,我们提出了一种动态日志文件异常检测方法,该方法可在时间窗口内对日志行进行增量分组。因此,一种新颖的聚类机制在原本孤立的聚类集合之间建立了联系。聚类演化技术从相邻的时间窗口分析聚类,并确定过渡(例如拆分或合并)。然后,自学习算法通过分析从其发展得出的指标来检测这些不断发展的集群的时间行为异常。我们在由包含已知异常的日志文件组成的说明性场景中应用原型。因此,我们研究了某些参数对检测能力和运行时间的影响。对这种情况的评估表明,正确识别了对数线簇动态变化的61.8%,而虚警率仅为0.7%。在自我调整以适应系统环境变化的同时有效检测这些异常的能力表明了所引入方法的适用性。 (C)2018作者。由Elsevier Ltd.发布

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号