|
|
Showing 1 - 3 of
3 matches in All Departments
This book provides insights into smart ways of computer log data
analysis, with the goal of spotting adversarial actions. It is
organized into 3 major parts with a total of 8 chapters that
include a detailed view on existing solutions, as well as novel
techniques that go far beyond state of the art. The first part of
this book motivates the entire topic and highlights major
challenges, trends and design criteria for log data analysis
approaches, and further surveys and compares the state of the art.
The second part of this book introduces concepts that apply
character-based, rather than token-based, approaches and thus work
on a more fine-grained level. Furthermore, these solutions were
designed for "online use", not only forensic analysis, but also
process new log lines as they arrive in an efficient single pass
manner. An advanced method for time series analysis aims at
detecting changes in the overall behavior profile of an observed
system and spotting trends and periodicities through log analysis.
The third part of this book introduces the design of the AMiner,
which is an advanced open source component for log data anomaly
mining. The AMiner comes with several detectors to spot new events,
new parameters, new correlations, new values and unknown value
combinations and can run as stand-alone solution or as sensor with
connection to a SIEM solution. More advanced detectors help to
determines the characteristics of variable parts of log lines,
specifically the properties of numerical and categorical fields.
Detailed examples throughout this book allow the reader to better
understand and apply the introduced techniques with open source
software. Step-by-step instructions help to get familiar with the
concepts and to better comprehend their inner mechanisms. A log
test data set is available as free download and enables the reader
to get the system up and running in no time. This book is designed
for researchers working in the field of cyber security, and
specifically system monitoring, anomaly detection and intrusion
detection. The content of this book will be particularly useful for
advanced-level students studying computer science, computer
technology, and information systems. Forward-thinking
practitioners, who would benefit from becoming familiar with the
advanced anomaly detection methods, will also be interested in this
book.
This book provides insights into smart ways of computer log data
analysis, with the goal of spotting adversarial actions. It is
organized into 3 major parts with a total of 8 chapters that
include a detailed view on existing solutions, as well as novel
techniques that go far beyond state of the art. The first part of
this book motivates the entire topic and highlights major
challenges, trends and design criteria for log data analysis
approaches, and further surveys and compares the state of the art.
The second part of this book introduces concepts that apply
character-based, rather than token-based, approaches and thus work
on a more fine-grained level. Furthermore, these solutions were
designed for "online use", not only forensic analysis, but also
process new log lines as they arrive in an efficient single pass
manner. An advanced method for time series analysis aims at
detecting changes in the overall behavior profile of an observed
system and spotting trends and periodicities through log analysis.
The third part of this book introduces the design of the AMiner,
which is an advanced open source component for log data anomaly
mining. The AMiner comes with several detectors to spot new events,
new parameters, new correlations, new values and unknown value
combinations and can run as stand-alone solution or as sensor with
connection to a SIEM solution. More advanced detectors help to
determines the characteristics of variable parts of log lines,
specifically the properties of numerical and categorical fields.
Detailed examples throughout this book allow the reader to better
understand and apply the introduced techniques with open source
software. Step-by-step instructions help to get familiar with the
concepts and to better comprehend their inner mechanisms. A log
test data set is available as free download and enables the reader
to get the system up and running in no time. This book is designed
for researchers working in the field of cyber security, and
specifically system monitoring, anomaly detection and intrusion
detection. The content of this book will be particularly useful for
advanced-level students studying computer science, computer
technology, and information systems. Forward-thinking
practitioners, who would benefit from becoming familiar with the
advanced anomaly detection methods, will also be interested in this
book.
This is an EXACT reproduction of a book published before 1923. This
IS NOT an OCR'd book with strange characters, introduced
typographical errors, and jumbled words. This book may have
occasional imperfections such as missing or blurred pages, poor
pictures, errant marks, etc. that were either part of the original
artifact, or were introduced by the scanning process. We believe
this work is culturally important, and despite the imperfections,
have elected to bring it back into print as part of our continuing
commitment to the preservation of printed works worldwide. We
appreciate your understanding of the imperfections in the
preservation process, and hope you enjoy this valuable book.
|
You may like...
Amsterdam
Christian Bale, Margot Robbie, …
DVD
R210
Discovery Miles 2 100
Loot
Nadine Gordimer
Paperback
(2)
R367
R340
Discovery Miles 3 400
|