How Important Are Logs of Ordinary Operations? Empirical Investigation of Anomaly Detection

Description

Anomaly detection is supposed to improve safety of computers connected to the Internet. Cyberattackers would thus try to cheat anomaly detection systems. In this paper, we focus on feasibility of cheating anomaly detection. We investigate anomaly situations which could not be detected based on a detection technique and attempt to generate such situations with using ordinary operations. We evaluate our attempt empirically for demonstrating that logs of ordinary operations are significant information which should not be leaked.

Details 詳細情報について

Report a problem

Back to top