A Pvalue-guided Anomaly Detection Approach Combining Multiple Heterogeneous Log Parser Algorithms on IIoT Systems

07/05/2019
by   Xueshuo Xie, et al.
0

Industrial Internet of Things (IIoT) is becoming an attack target of advanced persistent threat (APT). Currently, IIoT logs have not been effectively used for anomaly detection. In this paper, we use blockchain to prevent logs from being tampered with and propose a pvalue-guided anomaly detection approach. This approach uses statistical pvalues to combine multiple heterogeneous log parser algorithms. The weighted edit distance is selected as a score function to calculate the nonconformity score between a log and a predefined event. The pvalue is calculated based on the non-conformity scores which indicate how well a log matches an event. This approach is tested on a large number of real-world HDFS logs and IIoT logs. The experiment results show that abnormal events could be effectively recognized by our pvalue-guided approach.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/19/2022

Feature Selection for Fault Detection and Prediction based on Event Log Analysis

Event logs are widely used for anomaly detection and prediction in compl...
research
01/19/2023

ClusterLog: Clustering Logs for Effective Log-based Anomaly Detection

With the increasing prevalence of scalable file systems in the context o...
research
07/23/2022

Kellect: a Kernel-Based Efficient and Lossless Event Log Collector

As an essential element for log analysis, the system kernel-based event ...
research
11/18/2021

LAnoBERT : System Log Anomaly Detection based on BERT Masked Language Model

The system log generated in a computer system refers to large-scale data...
research
05/21/2023

Anomaly Detection Using One-Class SVM for Logs of Juniper Router Devices

The article deals with anomaly detection of Juniper router logs. Abnorma...
research
03/29/2021

Dynamically Modelling Heterogeneous Higher-Order Interactions for Malicious Behavior Detection in Event Logs

Anomaly detection in event logs is a promising approach for intrusion de...
research
08/21/2020

Self-Attentive Classification-Based Anomaly Detection in Unstructured Logs

The detection of anomalies is essential mining task for the security and...

Please sign up or login with your details

Forgot password? Click here to reset