2021
DOI: 10.1155/2021/5542543
|View full text |Cite
|
Sign up to set email alerts
|

A Security Log Analysis Scheme Using Deep Learning Algorithm for IDSs in Social Network

Abstract: Due to the complexity of the social network server system, various system abnormalities may occur and in turn will lead to subsequent system failures and information losses. Thus, to monitor the system state and detect the system abnormalities are of great importance. As the system log contains valuable information and records the system operating status and users’ behaviors, log data in system abnormality detection and diagnosis can ensure system availability and reliability. This paper discloses a log analys… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 32 publications
0
2
0
Order By: Relevance
“…As a result, system logs have become a key data resource for performance analysis and anomaly identification, as well as a prominent topic of researches in the area. Identifying anomalies is a significant problem that has been explored for decades [2]. To identify abnormalities in various applications such as intrusion detection, system log analysis, Realtime processing of bigdata, fraud detection, medical monitoring application, outlier detection, aviation safety study and several diverse approaches have been developed and employed.…”
Section: Introductionmentioning
confidence: 99%
“…As a result, system logs have become a key data resource for performance analysis and anomaly identification, as well as a prominent topic of researches in the area. Identifying anomalies is a significant problem that has been explored for decades [2]. To identify abnormalities in various applications such as intrusion detection, system log analysis, Realtime processing of bigdata, fraud detection, medical monitoring application, outlier detection, aviation safety study and several diverse approaches have been developed and employed.…”
Section: Introductionmentioning
confidence: 99%
“…In 2006, Zhong et al published an article on deep neural networks in Science and proposed the idea of deep learning algorithms, which promoted the development of artificial neural networks and the application of deep learning methods in the field of image recognition. However, their research focuses on image recognition rather than optimization algorithms, and the proposed algorithm is still not easy to understand and not easy to operate [3].…”
Section: Introductionmentioning
confidence: 99%