Anomaly Detection on the Use of Log
DOI:
CSTR:
Author:
Affiliation:

Clc Number:

Fund Project:

  • Article
  • |
  • Figures
  • |
  • Metrics
  • |
  • Reference
  • |
  • Related
  • |
  • Cited by
  • |
  • Materials
  • |
  • Comments
    Abstract:

    The use of log analysis of the outlier was proposed, on the log data preprocessing to establish the appropriate mining size, with depicting a normal mode. The improved method can be used for the large-scale anomalous detection of data sets, reducing the false alarm rate, while greatly improving the detection rate to achieve the desired time efficiency. The system can be with the regular analysis of the user logs, to automatically find the suspect from the log, in a timely manner to prevent or deal with the illegal operation, in order to make the detection system more intelligent, accurate and efficient.

    Reference
    Related
    Cited by
Get Citation

陈海宇,曾德胜.使用日志的异常检测.计算机系统应用,2011,20(9):90-94

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:December 21,2010
  • Revised:February 14,2011
  • Adopted:
  • Online:
  • Published:
Article QR Code
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063