June 29, 2022, 1:20 a.m. | Corentin Larroche, Johan Mazel, Stephan Clémençon

cs.CR updates on arXiv.org arxiv.org

Anomaly detection in event logs is a promising approach for intrusion
detection in enterprise networks. By building a statistical model of usual
activity, it aims to detect multiple kinds of malicious behavior, including
stealthy tactics, techniques and procedures (TTPs) designed to evade
signature-based detection systems. However, finding suitable anomaly detection
methods for event logs remains an important challenge. This results from the
very complex, multi-faceted nature of the data: event logs are not only
combinatorial, but also temporal and heterogeneous …

behavior detection detection event event logs higher logs malicious malicious behavior order

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Cyber Security Cloud Solution Architect

@ Microsoft | London, London, United Kingdom

Compliance Program Analyst

@ SailPoint | United States

Software Engineer III, Infrastructure, Google Cloud Security and Privacy

@ Google | Sunnyvale, CA, USA

Cryptography Expert

@ Raiffeisen Bank Ukraine | Kyiv, Kyiv city, Ukraine

Senior Cyber Intelligence Planner (15.09)

@ OCT Consulting, LLC | Washington, District of Columbia, United States