Using large language models for template detection from security event logs

被引:0
作者
Vaarandi, Risto [1 ]
Bahsi, Hayretdin [1 ,2 ]
机构
[1] Tallinn Univ Technol, Ctr Digital Forens & Cyber Secur, Tallinn, Estonia
[2] No Arizona Univ, Sch Informat Comp & Cyber Syst, Flagstaff, AZ USA
关键词
LLM-based template detection from security event logs; Template detection from event logs; Security event log analysis; LLMs for event log analysis; LLMs for cyber security;
D O I
10.1007/s10207-025-01018-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In modern IT systems and computer networks, real-time and offline event log analysis is a crucial part of cyber security monitoring. In particular, event log analysis techniques are essential for the timely detection of cyber attacks and for assisting security experts with the analysis of past security incidents. The detection of line patterns or templates from unstructured textual event logs has been identified as an important task of event log analysis since detected templates represent event types in the event log and prepare the logs for downstream online or offline security monitoring tasks. During the last 2 decades, a number of template mining algorithms have been proposed. However, many proposed algorithms rely on traditional data mining techniques, and the usage of Large Language Models (LLMs) has received less attention so far. Also, most approaches that harness LLMs are supervised, and unsupervised LLM-based template mining remains an understudied area. The current paper addresses this research gap and investigates the application of LLMs for unsupervised detection of templates from unstructured security event logs.
引用
收藏
页数:17
相关论文
共 30 条
  • [1] [Anonymous], 2024, RFC3164
  • [2] Logram: Efficient Log Parsing Using n-Gram Dictionaries
    Dai, Hetong
    Li, Heng
    Chen, Che Shao
    Shang, Weiyi
    Chen, Tse-Hsun
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2022, 48 (03) : 879 - 892
  • [3] Du M, 2016, IEEE DATA MINING, P859, DOI [10.1109/ICDM.2016.160, 10.1109/ICDM.2016.0103]
  • [4] ElasticStack, 2024, about us
  • [5] Execution Anomaly Detection in Distributed Systems through Unstructured Log Analysis
    Fu, Qiang
    Lou, Jian-Guang
    Wang, Yi
    Li, Jiang
    [J]. 2009 9TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING, 2009, : 149 - +
  • [6] Comparative Analysis of Pattern Mining Algorithms for Event Logs
    Gasimov, Orkhan
    Vaarandi, Risto
    Pihelgas, Mauno
    [J]. 2023 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE, CSR, 2023, : 1 - 7
  • [7] LogMine: Fast Pattern Recognition for Log Analytics
    Hamooni, Hossein
    Debnath, Biplob
    Xu, Jianwu
    Zhang, Hui
    Jiang, Guofei
    Mueen, Abdullah
    [J]. CIKM'16: PROCEEDINGS OF THE 2016 ACM CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT, 2016, : 1573 - 1582
  • [8] Drain: An Online Log Parsing Approach with Fixed Depth Tree
    He, Pinjia
    Zhu, Jieming
    Zheng, Zibin
    Lyu, Michael R.
    [J]. 2017 IEEE 24TH INTERNATIONAL CONFERENCE ON WEB SERVICES (ICWS 2017), 2017, : 33 - 40
  • [9] Huang JJ, 2024, Arxiv, DOI arXiv:2406.07174
  • [10] Abstracting Execution Logs to Execution Events for Enterprise Applications
    Jiang, Zhen Ming
    Hassan, Ahmed E.
    Flora, Parminder
    Hamann, Gilbert
    [J]. QSIC 2008: PROCEEDINGS OF THE EIGHTH INTERNATIONAL CONFERENCE ON QUALITY SOFTWARE, 2008, : 181 - +