2006 Securecomm and Workshops 2006
DOI: 10.1109/seccomw.2006.359572
|View full text |Cite
|
Sign up to set email alerts
|

System Anomaly Detection: Mining Firewall Logs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
16
0

Year Published

2009
2009
2023
2023

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 27 publications
(20 citation statements)
references
References 2 publications
0
16
0
Order By: Relevance
“…Tabulated feature vector (TFV) extraction gets around difficulties handling mixed and sparse data and facilitates the use of statistical methods for log data. The method proposed by Winding et al [32], and further applied in [3] takes log files and aggregates observations. The resultant feature vector is a count of occurrences of unique values and columns [32].…”
Section: Tabulated Feature Vectors (Tfvs)mentioning
confidence: 99%
“…Tabulated feature vector (TFV) extraction gets around difficulties handling mixed and sparse data and facilitates the use of statistical methods for log data. The method proposed by Winding et al [32], and further applied in [3] takes log files and aggregates observations. The resultant feature vector is a count of occurrences of unique values and columns [32].…”
Section: Tabulated Feature Vectors (Tfvs)mentioning
confidence: 99%
“…Machine learning techniques are used in the latest firewalls for identifying the threats based on logs of previous firewalls. These firewall logs store tons of information on these threats like, time of the attack done, that helps find and analyzing the new reasonably cyberattacks [3].…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, much of the related research has focused on anomaly detection at the device/software level (i.e. Lazarevic et al, 2003;Denning, 1987;Garcia-Teodoro et al, 2009), with little exploration into anomaly detection in the log files generated from the preexisting devices or software (i.e McDonald et al, 2012;Winding et al, 2006;Breier and Branišová, 2015). Consequently, efficient analytic approaches are desirable to help detect anomalous activity in cyber network log data .…”
Section: Introductionmentioning
confidence: 99%