Runtime security monitoring by an interplay between rule matching and deep learning-based anomaly detection on logs

Jan Antic, Joao Pita Costa, Ales Cernivec, Matija Cankar, Tomaz Martincic, Aljaz Potocnik, Hrvoje Ratkajec, Gorka Benguria Elguezabal, Nelly Leligou, Alexandra Lakka, Ismael Torres Boigues, Eliseo Villanueva Morte

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Citation (Scopus)

Abstract

In the era of digital transformation the increasing vulnerability of infrastructure and applications is often tied to the lack of technical capability and the improved intelligence of the attackers. In this paper, we discuss the complementarity between static security monitoring of rule matching and an application of self-supervised machine-learning to cybersecurity. Moreover, we analyse the context and challenges of supply chain resilience and smart logistics. Furthermore, we put this interplay between the two complementary methods in the context of a self-learning and self-healing approach.

Original languageEnglish
Title of host publication2023 19th International Conference on the Design of Reliable Communication Networks, DRCN 2023
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781665475983
DOIs
Publication statusPublished - 2023
Event19th International Conference on the Design of Reliable Communication Networks, DRCN 2023 - Vilanova i la Geltru, Spain
Duration: 17 Apr 202320 Apr 2023

Publication series

Name2023 19th International Conference on the Design of Reliable Communication Networks, DRCN 2023

Conference

Conference19th International Conference on the Design of Reliable Communication Networks, DRCN 2023
Country/TerritorySpain
CityVilanova i la Geltru
Period17/04/2320/04/23

Keywords

  • anomaly detection
  • deep learning
  • masked language modelling
  • natural language processing
  • runtime
  • security monitoring
  • self healing
  • self learning
  • smart logistics
  • supply chain resilience

Fingerprint

Dive into the research topics of 'Runtime security monitoring by an interplay between rule matching and deep learning-based anomaly detection on logs'. Together they form a unique fingerprint.

Cite this