Sökning: "Event logs"

Visar resultat 1 - 5 av 28 uppsatser innehållade orden Event logs.

  1. 1. AI/ML Development for RAN Applications : Deep Learning in Log Event Prediction

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Yuxin Sun; [2023]
    Nyckelord :LSTM; Anomaly Detection; Failure Prediction; Log Mining; Deep Learning; LSTM; Anomali Detection; Failure Prediction; Log Mining; Deep Learning;

    Sammanfattning : Since many log tracing application and diagnostic commands are now available on nodes at base station, event log can easily be collected, parsed and structured for network performance analysis. In order to improve In Service Performance of customer network, a sequential machine learning model can be trained, test, and deployed on each node to learn from the past events to predict future crashes or a failure. LÄS MER

  2. 2. Secure log-management for an Apache Kafka-based data-streaming service

    Uppsats för yrkesexamina på grundnivå, Mälardalens universitet/Akademin för innovation, design och teknik

    Författare :Hjalmar Kull; Mirza Hujic; [2023]
    Nyckelord :Apache Kafka;

    Sammanfattning : This thesis aims to investigate the prospect of using Apache Kafka to manage data streams based on secrecy/classification level and separate these data streams in order to meet the requirement set by the secrecy/classification levels. Basalt AB has the responsibility of managing classified data for private and state actors, including the Swedish Armed Forces and other organizations. LÄS MER

  3. 3. Howthe difficulty of obtaining intrusion artifacts can influence threat modeling : An experiment that shows how IT forensics can be used preventingly

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Oscar Meyer; [2022]
    Nyckelord :Threat modeling; IT Forensics; Linux; IT Defense; Risk assessment; Opensource; Volatility; Hotmodellering; IT Forensik; Linux; IT Försvar; Risk-bedömning; Opensource; Volatility;

    Sammanfattning : IT system intrusions are a problem today and the belief that all you need is a strong outer defense has faded. Today continuous monitoring of the IT infrastructure is widespread and alerts are continuously investigated. LÄS MER

  4. 4. Hur man Implementerar Säkerhetsinformation och Event Managering med en Generell Loggstrategi

    Kandidat-uppsats, Högskolan i Skövde/Institutionen för informationsteknologi

    Författare :Robert Jonsson; [2022]
    Nyckelord :;

    Sammanfattning : As internet activity and the use of technology increase so does the landscape for vulnerabilities that can be abused by cyber-criminals. In today's world, it is not the question if a cyber attack will happen but rather when will it happen. Therefore, to protect ourselves from attacks we have to find the vulnerabilities before they can be exploited. LÄS MER

  5. 5. Anomaly detection techniques for unsupervised machine learning

    Kandidat-uppsats, Umeå universitet/Institutionen för datavetenskap

    Författare :Albin Iivari; [2022]
    Nyckelord :Machine learning; unsupervised anomaly detection; anomaly detection in logfiles; isolation forest; cblof;

    Sammanfattning : Anomalies in data can be of great importance as they often indicate faulty behaviour. Locating these can thus assist in finding the source of the issue. Isolation Forest, an unsupervised machine learning model used to detect anomalies, is evaluated against two other commonly used models. The data set used were log files from a company named Trimma. LÄS MER