Skip to main content

Showing 1–5 of 5 results for author: Wurzenberger, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2309.02854  [pdf, other

    cs.LG

    A Critical Review of Common Log Data Sets Used for Evaluation of Sequence-based Anomaly Detection Techniques

    Authors: Max Landauer, Florian Skopik, Markus Wurzenberger

    Abstract: Log data store event execution patterns that correspond to underlying workflows of systems or applications. While most logs are informative, log data also include artifacts that indicate failures or incidents. Accordingly, log data are often used to evaluate anomaly detection techniques that aim to automatically disclose unexpected or otherwise relevant system behavior patterns. Recently, detectio… ▽ More

    Submitted 6 September, 2023; originally announced September 2023.

  2. arXiv:2308.12627  [pdf, other

    cs.CR

    Introducing a New Alert Data Set for Multi-Step Attack Analysis

    Authors: Max Landauer, Florian Skopik, Markus Wurzenberger

    Abstract: Intrusion detection systems (IDS) reinforce cyber defense by autonomously monitoring various data sources for traces of attacks. However, IDSs are also infamous for frequently raising false positives and alerts that are difficult to interpret without context. This results in high workloads on security operators who need to manually verify all reported alerts, often leading to fatigue and incorrect… ▽ More

    Submitted 24 August, 2023; originally announced August 2023.

  3. Deep Learning for Anomaly Detection in Log Data: A Survey

    Authors: Max Landauer, Sebastian Onder, Florian Skopik, Markus Wurzenberger

    Abstract: Automatic log file analysis enables early detection of relevant incidents such as system failures. In particular, self-learning anomaly detection techniques capture patterns in log data and subsequently report unexpected log event occurrences to system operators without the need to provide or manually model anomalous scenarios in advance. Recently, an increasing number of approaches leveraging dee… ▽ More

    Submitted 15 May, 2023; v1 submitted 8 July, 2022; originally announced July 2022.

    Journal ref: Machine Learning with Applications, vol. 12 (2023)

  4. Maintainable Log Datasets for Evaluation of Intrusion Detection Systems

    Authors: Max Landauer, Florian Skopik, Maximilian Frank, Wolfgang Hotwagner, Markus Wurzenberger, Andreas Rauber

    Abstract: Intrusion detection systems (IDS) monitor system logs and network traffic to recognize malicious activities in computer networks. Evaluating and comparing IDSs with respect to their detection accuracies is thereby essential for their selection in specific use-cases. Despite a great need, hardly any labeled intrusion detection datasets are publicly available. As a consequence, evaluations are often… ▽ More

    Submitted 16 March, 2022; originally announced March 2022.

    Journal ref: IEEE Transactions on Dependable and Secure Computing (2022)

  5. arXiv:2101.07113  [pdf, ps, other

    cs.CR

    Applying High-Performance Bioinformatics Tools for Outlier Detection in Log Data

    Authors: Markus Wurzenberger, Florian Skopik, Roman Fiedler, Wolfgang Kastner

    Abstract: Most of today's security solutions, such as security information and event management (SIEM) and signature based IDS, require the operator to evaluate potential attack vectors and update detection signatures and rules in a timely manner. However, today's sophisticated and tailored advanced persistent threats (APT), malware, ransomware and rootkits, can be so complex and diverse, and often use zero… ▽ More

    Submitted 18 January, 2021; originally announced January 2021.