Books > Computing & IT > Applications of computing > Artificial intelligence > Machine learning
|
Buy Now
Smart Log Data Analytics - Techniques for Advanced Security Analysis (Hardcover, 1st ed. 2021)
Loot Price: R3,941
Discovery Miles 39 410
|
|
Smart Log Data Analytics - Techniques for Advanced Security Analysis (Hardcover, 1st ed. 2021)
Expected to ship within 12 - 17 working days
|
This book provides insights into smart ways of computer log data
analysis, with the goal of spotting adversarial actions. It is
organized into 3 major parts with a total of 8 chapters that
include a detailed view on existing solutions, as well as novel
techniques that go far beyond state of the art. The first part of
this book motivates the entire topic and highlights major
challenges, trends and design criteria for log data analysis
approaches, and further surveys and compares the state of the art.
The second part of this book introduces concepts that apply
character-based, rather than token-based, approaches and thus work
on a more fine-grained level. Furthermore, these solutions were
designed for "online use", not only forensic analysis, but also
process new log lines as they arrive in an efficient single pass
manner. An advanced method for time series analysis aims at
detecting changes in the overall behavior profile of an observed
system and spotting trends and periodicities through log analysis.
The third part of this book introduces the design of the AMiner,
which is an advanced open source component for log data anomaly
mining. The AMiner comes with several detectors to spot new events,
new parameters, new correlations, new values and unknown value
combinations and can run as stand-alone solution or as sensor with
connection to a SIEM solution. More advanced detectors help to
determines the characteristics of variable parts of log lines,
specifically the properties of numerical and categorical fields.
Detailed examples throughout this book allow the reader to better
understand and apply the introduced techniques with open source
software. Step-by-step instructions help to get familiar with the
concepts and to better comprehend their inner mechanisms. A log
test data set is available as free download and enables the reader
to get the system up and running in no time. This book is designed
for researchers working in the field of cyber security, and
specifically system monitoring, anomaly detection and intrusion
detection. The content of this book will be particularly useful for
advanced-level students studying computer science, computer
technology, and information systems. Forward-thinking
practitioners, who would benefit from becoming familiar with the
advanced anomaly detection methods, will also be interested in this
book.
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!
|
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.