Slide 6
Slide 6 text
ϩάͷҟৗݕʹؔ͢Δઌߦݚڀ
• ϩάͷҟৗݕख๏
• άϧʔϓԽ͞Εͨϩά͔Βͷग़ݱύλʔϯΛͱʹݕग़[1,2]
• ϩάͷू߹͔ΒҟৗͱͳΔཁૉΛݕग़͢Δ[3]
• ࣌ܥྻҟৗݕ
• ϩάͷछྨʢ㲈ϑΥʔϚοτʣͷࣗಈఆख๏
• AprioriΞϧΰϦζϜͷԠ༻[4]
• Shortest Edit ScriptΛͬͨख๏[5]
[1] Min Du, Feifei Li, Guineng Zheng, and Vivek Srikumar. Deeplog: Anomaly detection and diagnosis from system logs through deep learning. In Proceedings of
the 2017 ACM SIGSAC Conference on Computer and Commu- nications Security, CCS ’17, pp. 1285–1298, New York, NY, USA, 2017. ACM.
[2] Siadati, H., & Memon, N. (2017). Detecting Structurally Anomalous Logins Within Enterprise Networks. In Proceedings of the 2017 ACM SIGSAC Conference
on Computer and Communications Security - CCS ’17(pp. 1273–1284).
[3] Xu, W., Huang, L., Fox, A., Patterson, D., & Jordan, M. (2009). Online system problem detection by mining patterns of console logs. In Proceedings - IEEE
International Conference on Data Mining, ICDM. https://doi.org/10.1109/ICDM.2009.19
[4] Risto Vaarandi. A data clustering algorithm for mining patterns from event logs. in IEEE IPOM’03 Proceed- ings, pp. 119–126, 2003
[5] Min Du and Feifei Li. Spell: Streaming parsing of system event logs. In Proceedings - 16th IEEE International Conference on Data Mining, ICDM 2016, pp.
859–864, United States, 1 2017. Institute of Electrical and Electronics Engineers Inc.