Review of Anomaly Detection Based on Log Analysis

The development of the Internet and the emergence of large-scale systems promote the rapid development of society, and bring a lot of convenience to people. Then comes the problem of network security, privacy theft, malicious attacks and other illegal acts still exist, a qualified software system wi...

Full description

Saved in:
Bibliographic Details
Published inInternational journal of advanced network, monitoring, and controls Vol. 5; no. 4; pp. 40 - 49
Main Author Wu, Xudong
Format Journal Article
LanguageEnglish
Published Xi'an Sciendo 01.01.2020
De Gruyter Poland
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:The development of the Internet and the emergence of large-scale systems promote the rapid development of society, and bring a lot of convenience to people. Then comes the problem of network security, privacy theft, malicious attacks and other illegal acts still exist, a qualified software system will log the key operation behavior of the software. Therefore, log analysis has become an important means of anomaly detection. Based on log analysis, this paper consulted the related literature on anomaly detection, elaborated the research status of anomaly detection based on log analysis from the aspects of template matching, rule self-generation and outlier analysis, and analyzed the challenges faced by anomaly detection based on log analysis.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:2470-8038
2470-8038
DOI:10.21307/ijanmc-2020-036