Anomaly Detection in Cyber Security with Graph-Based LSTM in Log Analysis
Intrusion detection systems utilize the analysis of log data to effectively detect anomalies. However, detecting anomalies quickly and effectively in large and heterogeneous log data can be challenging. To address this difficulty, this study proposes the GLSTM (Graph-based Long Short-Term Memory) fr...
Main Authors: | Yuksel Celık, Yusuf Alaca, Sanjay Goel |
---|---|
Format: | Article |
Language: | English |
Published: |
Akif AKGUL
2023-11-01
|
Series: | Chaos Theory and Applications |
Subjects: | |
Online Access: | https://dergipark.org.tr/en/download/article-file/3355185 |
Similar Items
-
System Log Detection Model Based on Conformal Prediction
by: Yitong Ren, et al.
Published: (2020-01-01) -
Quantifying the Significance and Relevance of Cyber-Security Text Through Textual Similarity and Cyber-Security Knowledge Graph
by: Otgonpurev Mendsaikhan, et al.
Published: (2020-01-01) -
Graph Anomaly Detection With Graph Neural Networks: Current Status and Challenges
by: Hwan Kim, et al.
Published: (2022-01-01) -
A bibliometric analysis of cyber security and cyber forensics research
by: Deepak Sharma, et al.
Published: (2023-03-01) -
Dataset of anomalies and malicious acts in a cyber-physical subsystem
by: Pedro Merino Laso, et al.
Published: (2017-10-01)