Runtime security monitoring by an interplay between rule matching and deep learning-based anomaly detection on logs

Jan Antic*, Joao Pita Costa, Ales Cernivec, Matija Cankar, Tomaz Martincic, Aljaz Potocnik, Hrvoje Ratkajec, Gorka Benguria Elguezabal, Nelly Leligou, Alexandra Lakka, Ismael Torres Boigues, Eliseo Villanueva Morte

*Corresponding author for this work

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)

    Abstract

    In the era of digital transformation the increasing vulnerability of infrastructure and applications is often tied to the lack of technical capability and the improved intelligence of the attackers. In this paper, we discuss the complementarity between static security monitoring of rule matching and an application of self-supervised machine-learning to cybersecurity. Moreover, we analyse the context and challenges of supply chain resilience and smart logistics. Furthermore, we put this interplay between the two complementary methods in the context of a self-learning and self-healing approach.

    Original languageEnglish
    Title of host publication2023 19th International Conference on the Design of Reliable Communication Networks, DRCN 2023
    PublisherInstitute of Electrical and Electronics Engineers Inc.
    ISBN (Electronic)9781665475983
    DOIs
    Publication statusPublished - 2023
    Event19th International Conference on the Design of Reliable Communication Networks, DRCN 2023 - Vilanova i la Geltru, Spain
    Duration: 17 Apr 202320 Apr 2023

    Publication series

    Name2023 19th International Conference on the Design of Reliable Communication Networks, DRCN 2023

    Conference

    Conference19th International Conference on the Design of Reliable Communication Networks, DRCN 2023
    Country/TerritorySpain
    CityVilanova i la Geltru
    Period17/04/2320/04/23

    Keywords

    • anomaly detection
    • deep learning
    • masked language modelling
    • natural language processing
    • runtime
    • security monitoring
    • self healing
    • self learning
    • smart logistics
    • supply chain resilience

    Fingerprint

    Dive into the research topics of 'Runtime security monitoring by an interplay between rule matching and deep learning-based anomaly detection on logs'. Together they form a unique fingerprint.

    Cite this