Please use this identifier to cite or link to this item:
Title: A Dynamic Rule Creation Based Anomaly Detection Method for Identifying Security Breaches in Log Records
Authors: Breier, Jakub
Branišová, Jana
Keywords: Network security
Log analysis
Issue Date: 2015
Source: Breier, J., & Branišová, J. (2015). A Dynamic Rule Creation Based Anomaly Detection Method for Identifying Security Breaches in Log Records. Wireless Personal Communications, in press.
Series/Report no.: Wireless Personal Communications
Abstract: Evidence of security breaches can be found in log files, created by various network devices in order to provide information about their operation. Huge amount of data contained within these files usually prevents to analyze them manually, therefore it is necessary to utilize automatic methods capable of revealing potential attacks. In this paper we propose a method for anomaly detection in log files, based on data mining techniques for dynamic rule creation. To support parallel processing, we employ Apache Hadoop framework, providing distributed storage and distributed processing of data. Outcomes of our testing show potential to discover new types of breaches and plausible error rates below 10 %. Also, rule generation and anomaly detection speeds are competitive to currently used algorithms, such as FP-growth and apriori.
ISSN: 0929-6212
DOI: 10.1007/s11277-015-3128-1
Rights: © 2015 Springer Science+Business Media New York. This is the author created version of a work that has been peer reviewed and accepted for publication by Wireless Personal Communications, Springer Science+Business Media New York. It incorporates referee’s comments but changes resulting from the publishing process, such as copyediting, structural formatting, may not be reflected in this document. The published version is available at: [].
Fulltext Permission: open
Fulltext Availability: With Fulltext
Appears in Collections:TL Journal Articles

Citations 20

Updated on Aug 31, 2020

Web of ScienceTM
Citations 20

Updated on Mar 9, 2021

Page view(s)

Updated on Sep 28, 2022

Download(s) 20

Updated on Sep 28, 2022

Google ScholarTM




Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.