A LSTM-Based Anomaly Detection Model for Log Analysis

被引:16
|
作者
Zhao, Zhijun [1 ]
Xu, Chen [1 ]
Li, Bo [2 ]
机构
[1] Jiaxing Hengchuang Elect Grp Co Ltd, Informat Technol Brach, Jiaxing, Zhejiang, Peoples R China
[2] Beihang Univ, Sch Comp Sci & Engn, Beijing, Peoples R China
来源
JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY | 2021年 / 93卷 / 07期
关键词
Anomaly detection; Log analysis;
D O I
10.1007/s11265-021-01644-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security devices produce huge number of logs which are far beyond the processing speed of human beings. This paper introduces an unsupervised approach to detecting anomalous behavior in large scale security logs. We propose a novel feature extracting mechanism and could precisely characterize the features of malicious behaviors. We design a LSTM-based anomaly detection approach and could successfully identify attacks on two widely-used datasets. Our approach outperforms three popular anomaly detection algorithms, one-class SVM, GMM and Principal Components Analysis, in terms of accuracy and efficiency.
引用
收藏
页码:745 / 751
页数:7
相关论文
共 50 条
  • [1] A LSTM-Based Anomaly Detection Model for Log Analysis
    Zhijun Zhao
    Chen Xu
    Bo Li
    Journal of Signal Processing Systems, 2021, 93 : 745 - 751
  • [2] A LSTM-Based Anomaly Detection Model for Log Analysis
    Zhao, Zhijun
    Xu, Chen
    Li, Bo
    Journal of Signal Processing Systems, 2021, 93 (07) : 745 - 751
  • [3] An LSTM-based anomaly detection model for the deformation of concrete dams
    Liu, Changwei
    Pan, Jianwen
    Wang, Jinting
    STRUCTURAL HEALTH MONITORING-AN INTERNATIONAL JOURNAL, 2024, 23 (03): : 1914 - 1925
  • [4] MLog: Mogrifier LSTM-Based Log Anomaly Detection Approach Using Semantic Representation
    Fu, Yuanyuan
    Liang, Kun
    Xu, Jian
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (05) : 3537 - 3549
  • [5] LSTM-based radiography for anomaly detection in softwarized infrastructures
    Diamanti, Alessio
    Vilchez, Jose Manuel Sanchez
    Secci, Stefano
    PROCEEDINGS OF THE 2020 32ND INTERNATIONAL TELETRAFFIC CONGRESS (ITC 32), 2020, : 28 - 36
  • [6] An optimized LSTM-based deep learning model for anomaly network intrusion detection
    Dash, Nitu
    Chakravarty, Sujata
    Rath, Amiya Kumar
    Giri, Nimay Chandra
    Aboras, Kareem M.
    Gowtham, N.
    SCIENTIFIC REPORTS, 2025, 15 (01):
  • [7] LSTM-Based Anomaly Detection of Process Instances: Benchmark and Tweaks
    Lahann, Johannes
    Pfeiffer, Peter
    Fettke, Peter
    PROCESS MINING WORKSHOPS, ICPM 2022, 2023, 468 : 229 - 241
  • [8] Hunting for Insider Threats Using LSTM-Based Anomaly Detection
    Villarreal-Vasquez, Miguel
    Modelo-Howard, Gaspar
    Dube, Simant
    Bhargava, Bharat
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (01) : 451 - 462
  • [9] LSTM-Based Anomaly Detection: Detection Rules from Extreme Value Theory
    Davis, Neema
    Raina, Gaurav
    Jagannathan, Krishna
    PROGRESS IN ARTIFICIAL INTELLIGENCE, EPIA 2019, PT I, 2019, 11804 : 572 - 583
  • [10] A MODEL FOR WEBSITE ANOMALY DETECTION BASED ON LOG ANALYSIS
    Han, Xu
    Lv, Tao
    Wei, Lin
    Wu, Yanyan
    Liu, Jianyi
    Wang, Cong
    2014 IEEE 3rd International Conference on Cloud Computing and Intelligence Systems (CCIS), 2014, : 604 - 608