2022
DOI: 10.32604/csse.2022.022365
|View full text |Cite
|
Sign up to set email alerts
|

LogUAD: Log Unsupervised Anomaly Detection Based on Word2Vec

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
18
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 33 publications
(18 citation statements)
references
References 18 publications
0
18
0
Order By: Relevance
“…We consider this aspect an intrinsic limitation of the model rather than a weakness of the study. Other promising scenarios are worthy of mention since they may prove more accurate in the near future, as suggested by some groups [ 37 , 38 , 39 , 40 ].…”
Section: Discussionmentioning
confidence: 99%
“…We consider this aspect an intrinsic limitation of the model rather than a weakness of the study. Other promising scenarios are worthy of mention since they may prove more accurate in the near future, as suggested by some groups [ 37 , 38 , 39 , 40 ].…”
Section: Discussionmentioning
confidence: 99%
“…The most widely used for word embedding models are Word2Vec (Mikolov et al, 2013b,a) and GloVe (Pennington et al, 2014) both of which are based on unsupervised learning. LogEvent2vec (Wang et al, 2020) and LogUAD (Wang et al, 2022) use Word2Vec to generate word vectors and generates weighted log sequence feature vectors. Doc2Vec (Le and Mikolov, 2014) is similar to the Word2vec algorithm, but instead of vectorizing words, it creates a vector embedding of text snippets.…”
Section: Semantics Modelsmentioning
confidence: 99%
“…• Clustering of similar events to reduce the volume of processed information and classify security events to event detection (ED) (Liu et al, 2019b;Deng and Hooi, 2021), event grouping (EG) (Hostiadi et al, 2019;Sun et al, 2020), and event pattern extraction (EPE) (Dhaou et al, 2021;Zeng et al, 2021). • Intrusion detection (ID), which deals with multi-stage and targeted attacks (Joloudari et al, 2020;Sen et al, 2022), or anomaly detection (AD) (Han et al, 2020;Wang et al, 2022) to notify the security administrator about misuses and deviations from normal behavior, respectively. • Intrusion prediction (IP) (Holgado et al, 2017;Oki et al, 2018) based on incoming events, which allows early detection of intruder targets.…”
Section: Summary Of Ai-based Security Event Correlation Modelsmentioning
confidence: 99%
“…[7] proposes a deep neural network model utilising Long Short-Term Memory (LSTM) to learn log patterns different from the normal to allow detection of anomalies. [8] uses semantic relationships between logs to generate word vectors and weighted log sequence feature vectors with Term Frequency-Inverse Document Frequency (TF-IDF), which is then used with K-Means clustering to detect anomalous logs. [9] uses isolation forest and deep autoencoder neural networks to detect anomalous logs.…”
Section: Related Workmentioning
confidence: 99%
“…There have been several studies that focus on reducing the number of alerts and anomalies [1][2][3][4][5][6][7][8][9][10], but an automated anomaly detection using log data is still an ongoing challenge. Anomaly detection is, in fact, a binary classification, deciding between normal and anomalous classes; however, there are a number of challenges, which can be summarised as follows:…”
Section: Introductionmentioning
confidence: 99%