2022
DOI: 10.1109/access.2022.3141161
|View full text |Cite
|
Sign up to set email alerts
|

AnomalyAdapters: Parameter-Efficient Multi-Anomaly Task Detection

Abstract: The emergence of technological innovations brings sophisticated threats. Cyberattacks are increasing day by day aligned with these innovations and entails rapid solutions for defense mechanisms. These attacks may hinder enterprise operations or more importantly, interrupt critical infrastructure systems, that are essential to safety, security, and well-being of a society. Anomaly detection, as a protection step, is significant for ensuring a system security. Logs, which are accepted sources universally, are ut… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 39 publications
0
2
0
Order By: Relevance
“…Moura et al [20] discuss the employment of open-source programmable asset orchestration to defend against faults, congestion, or cyber-attacks in edge cloud systems. Ünal et al [21] propose a multi-anomaly detection model for cyber threat data. Pretrained transformers' variant is used to encode log sequences for learning the structure along with anomaly types.…”
Section: Related Workmentioning
confidence: 99%
“…Moura et al [20] discuss the employment of open-source programmable asset orchestration to defend against faults, congestion, or cyber-attacks in edge cloud systems. Ünal et al [21] propose a multi-anomaly detection model for cyber threat data. Pretrained transformers' variant is used to encode log sequences for learning the structure along with anomaly types.…”
Section: Related Workmentioning
confidence: 99%
“…Traditional rule-based approaches have many challenges, including the difficulty of creating rules that can detect unforeseen error conditions and the effort required to manually maintain rule sets. Advances in deep learning and anomaly detection methodologies show potential for practical use against many forms of log detection targets, including failures [1], security/network intrusions [2] [3] [4], and performance degradation indicators [5] [6]. These methods have the potential to improve upon the weaknesses of rule-based approaches in that they don't require manual rule creation or maintenance.…”
Section: Introductionmentioning
confidence: 99%