Anomaly Detection in Cyber Security with Graph-Based LSTM in Log Analysis

Intrusion detection systems utilize the analysis of log data to effectively detect anomalies. However, detecting anomalies quickly and effectively in large and heterogeneous log data can be challenging. To address this difficulty, this study proposes the GLSTM (Graph-based Long Short-Term Memory) fr...

Full description

Bibliographic Details
Main Authors: Yuksel Celık, Yusuf Alaca, Sanjay Goel
Format: Article
Language:English
Published: Akif AKGUL 2023-11-01
Series:Chaos Theory and Applications
Subjects:
Online Access:https://dergipark.org.tr/en/download/article-file/3355185