Please use this identifier to cite or link to this item: https://hdl.handle.net/10316/105923
Title: Combining K-Means and XGBoost Models for Anomaly Detection Using Log Datasets
Authors: Henriques, João 
Caldeira, Filipe 
Cruz, Tiago 
Simões, Paulo 
Keywords: anomaly detection; clustering; k-means; gradient tree boosting; XGBoost
Issue Date: 2020
Publisher: MDPI
Project: UIDB/05583/2020 
CISUC UID/CEC/00326/2020 
Research Center in Digital Services (CISeD) 
Polytechnic of Viseu 
Serial title, monograph or event: Electronics (Switzerland)
Volume: 9
Issue: 7
Abstract: Computing and networking systems traditionally record their activity in log files, which have been used for multiple purposes, such as troubleshooting, accounting, post-incident analysis of security breaches, capacity planning and anomaly detection. In earlier systems those log files were processed manually by system administrators, or with the support of basic applications for filtering, compiling and pre-processing the logs for specific purposes. However, as the volume of these log files continues to grow (more logs per system, more systems per domain), it is becoming increasingly difficult to process those logs using traditional tools, especially for less straightforward purposes such as anomaly detection. On the other hand, as systems continue to become more complex, the potential of using large datasets built of logs from heterogeneous sources for detecting anomalies without prior domain knowledge becomes higher. Anomaly detection tools for such scenarios face two challenges. First, devising appropriate data analysis solutions for effectively detecting anomalies from large data sources, possibly without prior domain knowledge. Second, adopting data processing platforms able to cope with the large datasets and complex data analysis algorithms required for such purposes. In this paper we address those challenges by proposing an integrated scalable framework that aims at efficiently detecting anomalous events on large amounts of unlabeled data logs. Detection is supported by clustering and classification methods that take advantage of parallel computing environments. We validate our approach using the the well known NASA Hypertext Transfer Protocol (HTTP) logs datasets. Fourteen features were extracted in order to train a k-means model for separating anomalous and normal events in highly coherent clusters. A second model, making use of the XGBoost system implementing a gradient tree boosting algorithm, uses the previous binary clustered data for producing a set of simple interpretable rules. These rules represent the rationale for generalizing its application over a massive number of unseen events in a distributed computing environment. The classified anomaly events produced by our framework can be used, for instance, as candidates for further forensic and compliance auditing analysis in security management.
URI: https://hdl.handle.net/10316/105923
ISSN: 2079-9292
DOI: 10.3390/electronics9071164
Rights: openAccess
Appears in Collections:FCTUC Eng.Informática - Artigos em Revistas Internacionais

Show full item record

SCOPUSTM   
Citations

37
checked on Apr 15, 2024

WEB OF SCIENCETM
Citations

24
checked on Apr 2, 2024

Page view(s)

72
checked on Apr 23, 2024

Download(s)

7
checked on Apr 23, 2024

Google ScholarTM

Check

Altmetric

Altmetric


This item is licensed under a Creative Commons License Creative Commons