Essays about: "Security Logs"

Showing result 1 - 5 of 28 essays containing the words Security Logs.

  1. 1. Unsupervised Anomaly Detection and Explainability for Ladok Logs

    University essay from Umeå universitet/Institutionen för datavetenskap

    Author : Mimmi Edholm; [2023]
    Keywords : machine learing; anomaly detection; ml;

    Abstract : Anomaly detection is the process of finding outliers in data. This report will explore the use of unsupervised machine learning for anomaly detection as well as the importance of explaining the decision making of the model. READ MORE

  2. 2. Detecting Fraud in Affiliate Marketing: Comparative Analysis of Supervised Machine Learning Algorithms

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Oskar Ahlqvist; [2023]
    Keywords : Fraud detection; Machine learning; Random Forest; support vector machine; Logistic Regression; Classification models; Affiliate marketing;

    Abstract : Affiliate marketing has become a rapidly growing part of the digital marketing sector. However, fraud in affiliate marketing raises a serious threat to the trust and financial stability of the involved parties. READ MORE

  3. 3. Adopting Observability-Driven Development for Cloud-Native Applications : Designing End-to-end Observability Pipeline using Open-source Software

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Chujie Ni; [2023]
    Keywords : Observability-driven Development; End-to-end observability; Open-source pipeline; OpenTelemetry; Kubernetes; Observerbarhetsdriven utveckling; observerbarhet från slut till slut; pipeline med öppen källkod; OpenTelemetry; Kubernetes;

    Abstract : As cloud-native applications become more distributed, complex, and unpredictable with the adoption of microservices and other new architectural components, traditional monitoring solutions are inadequate in providing end-to-end visibility and proactively identifying deviations from expected behaviour before they become disruptive to services. In response to these challenges, observability-driven development (ODD) is proposed as a new methodology that leverages tools and practices to observe the state and detect the behaviour of systems. READ MORE

  4. 4. Secure log-management for an Apache Kafka-based data-streaming service

    University essay from Mälardalens universitet/Akademin för innovation, design och teknik

    Author : Hjalmar Kull; Mirza Hujic; [2023]
    Keywords : Apache Kafka;

    Abstract : This thesis aims to investigate the prospect of using Apache Kafka to manage data streams based on secrecy/classification level and separate these data streams in order to meet the requirement set by the secrecy/classification levels. Basalt AB has the responsibility of managing classified data for private and state actors, including the Swedish Armed Forces and other organizations. READ MORE

  5. 5. Log Anomaly Detection of Structured Logs in a Distributed Cloud System

    University essay from Lunds universitet/Institutionen för reglerteknik

    Author : David Nilsson; Albin Olsson; [2022]
    Keywords : Technology and Engineering;

    Abstract : As computer systems grow larger and more complex, the task of maintaining the system and finding potential security threats or other malfunctions become increasingly hard. Traditionally, this has had to be done by manually examining the logs. READ MORE