Essays about: "anomaly detection"

Showing result 1 - 5 of 195 essays containing the words anomaly detection.

  1. 1. Sequential Anomaly Detection for Log Data Using Deep Learning

    University essay from Göteborgs universitet/Institutionen för matematiska vetenskaper

    Author : Lina Hammargren; Wei Wu; [2021-06-14]
    Keywords : anomaly detection; recurrent neural network; long short-term memory; semi-supervised learning; seq2seq; transformer; unsupervised learning; log analysis;

    Abstract : AbstractSoftware development with continuous integration changes needs frequent testing forassessment. Analyzing the test output manually is time-consuming and automatingthis process could be beneficial to an organization. READ MORE

  2. 2. Anomaly detection in 5G beam propagation

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Katarina Hellgren; Phiphi Tran; [2021]
    Keywords : Machine learning; wireless communication; 5G; beam propagation; DBSCAN; KNN; anomaly detection; clustering; Technology and Engineering;

    Abstract : Advancements in today's technology has motivated invention of faster mobile communication systems. The fifth generation mobile network, 5G, is the latest version made by the third generation partnership project (3GPP) and expects to both increase connection speed and reduce latency, which eventually will make it applicable in supporting state-of-the art technologies such as virtual reality and self-driving vehicles among others. READ MORE

  3. 3. Anomaly Detection in Wait Reports and its Relation with Apache Cassandra Statistics

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap; Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Abheyraj Singh Madhu; Sreemayi Rapolu; [2021]
    Keywords : Wait reports analysis; time-series anomaly detection; Apache Cassandra statistics; anomaly detection; behavior reporting tool;

    Abstract : Background: Apache Cassandra is a highly scalable distributed system that can handle large amounts of data through several nodes / virtual machines grouped together as Apache Cassandra clusters. When one such node in an Apache Cassandra cluster is down, there is a need for a tool or an approach that can identify this failed virtual machine by analyzing the data generated from each of the virtual machines in the cluster. READ MORE

  4. 4. INTRUSION DETECTION USING MACHINE LEARNING FOR INDUSTRIAL CONTROL SYSTEMS

    University essay from Mälardalens högskola/Akademin för innovation, design och teknik

    Author : Roland Plaka; [2021]
    Keywords : intrusion detection; machine learning; security;

    Abstract : An intrusion detection system (IDS) is a software application that monitors a network forunauthorized and malicious activities or security policy violations related to confidentiality,integrity, and availability of a system. In this thesis, we performed detailed literature reviewson the different types of IDS, anomaly detection methods, and machine learning algorithmsthat can be used for detection and classification. READ MORE

  5. 5. Anomaly Detection in Log Files Using Machine Learning Techniques

    University essay from Blekinge Tekniska Högskola/Fakulteten för datavetenskaper

    Author : Lakshmi Geethanjali Mandagondi; [2021]
    Keywords : Anomaly Detection; Log Files; Machine Learning; Clustering; Outlier Detection;

    Abstract : Context: Log files are produced in most larger computer systems today which contain highly valuable information about the behavior of the system and thus they are consulted fairly often in order to analyze behavioral aspects of the system. Because of the very high number of log entries produced in some systems, it is however extremely difficult to seek out relevant information in these files. READ MORE