dc.contributor.author | Sipola, Tuomo | |
dc.contributor.editor | Lehto, Martti | |
dc.contributor.editor | Neittaanmäki, Pekka | |
dc.date.accessioned | 2020-11-23T09:51:53Z | |
dc.date.available | 2020-11-23T09:51:53Z | |
dc.date.issued | 2015 | |
dc.identifier.citation | Sipola, T. (2015). Knowledge Discovery from Network Logs. In M. Lehto, & P. Neittaanmäki (Eds.), <i>Cyber Security: Analytics, Technology and Automation</i> (pp. 195-203). Springer International Publishing. Intelligent Systems, Control and Automation: Science and Engineering, 78. <a href="https://doi.org/10.1007/978-3-319-18302-2_12" target="_blank">https://doi.org/10.1007/978-3-319-18302-2_12</a> | |
dc.identifier.other | CONVID_24769601 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/72725 | |
dc.description.abstract | Modern communications networks are complex systems, which facilitates malicious behavior. Dynamic web services are vulnerable to unknown intrusions, but traditional cyber security measures are based on fingerprinting. Anomaly detection differs from fingerprinting in that it finds events that differ from the baseline traffic. The anomaly detection methodology can be modelled with the knowledge discovery process. Knowledge discovery is a high-level term for the whole process of deriving actionable knowledge from databases. This article presents the theory behind this approach, and showcases research that has produced network log analysis tools and methods. | fi |
dc.format.extent | 269 | |
dc.format.mimetype | application/pdf | |
dc.language.iso | eng | |
dc.publisher | Springer International Publishing | |
dc.relation.ispartof | Cyber Security: Analytics, Technology and Automation | |
dc.relation.ispartofseries | Intelligent Systems, Control and Automation: Science and Engineering | |
dc.rights | In Copyright | |
dc.subject.other | cyber security | fi |
dc.title | Knowledge Discovery from Network Logs | |
dc.type | book part | |
dc.identifier.urn | URN:NBN:fi:jyu-202011236715 | |
dc.contributor.laitos | Tietotekniikan laitos | fi |
dc.contributor.laitos | Department of Mathematical Information Technology | en |
dc.contributor.oppiaine | Tietotekniikka | fi |
dc.contributor.oppiaine | Mathematical Information Technology | en |
dc.type.uri | http://purl.org/eprint/type/BookItem | |
dc.date.updated | 2020-11-23T07:15:09Z | |
dc.relation.isbn | 978-3-319-18301-5 | |
dc.type.coar | http://purl.org/coar/resource_type/c_3248 | |
dc.description.reviewstatus | peerReviewed | |
dc.format.pagerange | 195-203 | |
dc.relation.issn | 2213-8986 | |
dc.relation.numberinseries | 78 | |
dc.type.version | acceptedVersion | |
dc.rights.copyright | © 2015 Springer | |
dc.rights.accesslevel | openAccess | fi |
dc.type.publication | bookPart | |
dc.subject.yso | kyberturvallisuus | |
dc.format.content | fulltext | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p26189 | |
dc.rights.url | http://rightsstatements.org/page/InC/1.0/?language=en | |
dc.relation.doi | 10.1007/978-3-319-18302-2_12 | |
dc.type.okm | A3 | |