Skip to main navigation Skip to search Skip to main content

Anomaly Detection in Cyber Security with Graph-Based LSTM in Log Analysis

  • Hitit University
  • Karabuk University

Research output: Contribution to journalArticlepeer-review

12 Scopus citations

Abstract

Intrusion detection systems utilize the analysis of log data to effectively detect anomalies. However, detecting anomalies quickly and effectively in large and heterogeneous log data can be challenging. To address this difficulty, this study proposes the GLSTM (Graph-based Long Short-Term Memory) framework, a graph-based deep learning model that analyzes log data to detect cyber-attacks rapidly and effectively. The framework involves standardizing the complex and diverse log data, training this data on an artificial intelligence model, and detecting anomalies. Initially, the complex and diverse log data is transformed into graph data using Node2Vec, enabling efficient and rapid analysis on the artificial intelligence model. Subsequently, these graph data are trained using LSTM (Long Short-Term Memory), Bi-LSTM, and GRU(Gated Recurrent Unit) deep learning algorithms. The proposed framework is tested using Hadoop’s HDFS dataset, collected from different systems and heterogeneous sources, as well as the BGL and IMDB datasets. Experimental results on the selected datasets demonstrate high levels of success.

Original languageEnglish
Pages (from-to)188-197
Number of pages10
JournalChaos Theory and Applications
DOIs
StatePublished - 2023

Keywords

  • Anomaly detection
  • Cyber security
  • Deep learning
  • Graph
  • HDFS
  • Node2Vec

Fingerprint

Dive into the research topics of 'Anomaly Detection in Cyber Security with Graph-Based LSTM in Log Analysis'. Together they form a unique fingerprint.

Cite this