1
1
1Cisco12020-01-04 18:19:57
Journaling
1Cisco1, 2020-01-04 18:19:57

Neural networks for analyzing logs?

Hello, habr, at the university I got work on a project, but there is very little information about it on the network.
The essence of the question is whether it is possible to create a system of trained neural networks to analyze company logs in real time to detect any anomalous activity? and where can I read about it, because what I found is a few short articles and videos. Thanks in advance for any information on the topic

Answer the question

In order to leave comments, you need to log in

4 answer(s)
D
dmshar, 2020-01-04
@1Cisco1

As you have already been answered, "any" is impossible. Separate species - it is quite possible. And, by the way, not only the logs are analyzed at the same time. Only here in one post on the forum you can’t talk about it.
Here at least two areas of knowledge intersect - machine learning (and neural networks, as one of the tools used in it) and cybersecurity. To figure it out in both, you need to spend more than one hundred (!) Hours.
There is a lot of literature on this topic, so why you could only find "a few short articles and videos" is completely incomprehensible.
For example, start with these articles:
D. Berman, A Survey of Deep Learning Methods for Cyber ​​Security
V. Rao Vemuri. Machine learning in computer security
Monowar H. Bhuyan,. Network Anomaly Detection: Methods, Systems and Tools
And then you can move on to more serious sources:
1. Leigh Metcalf, William Casey. Cybersecurity and Applied Mathematics
2. Ivan Carrascosa et.al. Data Analytics and Decision Support for Cybersecurity Trends,
Methodologies and Applications.
3. Big Data Analytics in Cybersecurity. Edited by Onur Savas and Julia Deng
4. Brij B. Gupta. Machine Learning for Computer and Cyber ​​Security Principles, Algorithms, and Practices
5. Nour Moustafa, Designing an online and reliable statistical anomaly detection framework for dealing with large high-speed network traffic
6. Joshua Saxe, MALWARE DATA SCIENCE Attack Detection and Attribution
........... etc. - in general, there are a lot of sources.
And everything is easily found on the web. Good luck

G
GavriKos, 2020-01-04
@GavriKos

Can. Start with the subject area - ANN is right here, on the side.
What is anomalous activity? What metrics are collected? How to classify/categorize all this.
Well, then it’s a matter of technology - having a bunch of signs, make a training sample and feed it to the ANN.

I
Ivan Shumov, 2020-01-04
@inoise

It is possible, but why if almost all clouds have already done this?

X
xmoonlight, 2020-01-04
@xmoonlight

detection of any anomalous activity
It is forbidden!

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question