Comparative analysis of system logs and streaming data anomaly detection algorithms

The comparative analysis of multiple commonly used approaches of the analysis of system logs, and streaming data massively generated by company IT infrastructure with an unattended anomaly detection feature. Hierarchical temporary memory algorithms.

Подобные документы

  • A practical guide to using encryption technology to ensure confidentiality, security and integrity of your most valuable assets - its data. The analysis of the basic fundamentals of cryptography and its techniques for dealing with electronic security.

    ?????, добавлен 08.03.2014

  • Analysis of the influence of information processes on the development of the state. The use of computer technology in the banking sector. Development of an automated terminal monitoring system and a database management system. Thin client functions.

    ??????, добавлен 26.01.2021

  • A computer based decision support system is proposed the basic tasks of which are adaptive model constructing of financial processes. The system is developed with the use of system analysis principles, forming alternatives for models and forecasts.

    ??????, добавлен 20.01.2017

  • Analysis of various methods and strategies for scaling the fintech API to solve the problems of financial applications. The principles of distributing traffic between multiple servers to improve their performance. Asynchronous data processing methods.

    ??????, добавлен 14.12.2024

  • A General idea on the basis of information contained in cryptographic systems. Feature encryption standard "Rijndael". The principles of encoding data with a public key algorithm RSA. Safety standards models of information flow in computer programs.

    ?????, добавлен 08.03.2014

  • Characterization major methods of construction principal manifolds. Familiarity with the issues numerical computation. Analysis nonlinear manifold learning from unorganized data points is a challenging unsupervised learning and data visualization.

    ???????????, добавлен 08.02.2013

  • Using C ++ Builder to create a binary file. The development of a dynamic array structure of the binary data using the individual functions, located in the library user. The general analysis of the data. Create screensaver with information about the task.

    ???????? ??????, добавлен 13.07.2014

  • The impact of the used modeling language for the result of the synthesis models. Generating artificial logs events according to the BPMN 2.0, their implementation in the form of a program that extends the software platform Process Mining Framework (ProM).

    ???????? ??????, добавлен 30.08.2016

  • The development and use of new, progressive information technologies based on the widespread use of superproductive and reliable dual-use computer systems and components. Consideration of the problem of the Fourier transform and its application.

    ??????, добавлен 01.11.2021

  • The NCBI Data Model. Submitting DNA Sequences to the Databases. Genomic Mapping and Mapping Databases. Information Retrieval from Biological Databases. Creation and Analysis of Protein Multiple Sequence Alignments. Sequence Assembly, Finishing Methods.

    ??????? ???????, добавлен 25.11.2013

  • ??????? ??????? Data Mining, ??? ??????? ?????????????. ??????? ?????????????? ??????????. ????????? ??????????, ????????? ???????? ? Data Mining. ???????? ?????????? ??? ?????? ??????? ? 1960-? ?. Data Mining ??? ????? ????? ?????????????? ??????????.

    ???????, добавлен 14.01.2015

  • Joint fingerprinting and decryption of broadcast messages. An estimation attack on content-based video fingerprinting. Statistics- and spatiality-based feature distance measure for error resilient image authentication. Analysis based on quartic equation.

    ???? ??????, добавлен 08.03.2014

  • Research and analysis of ways to solve the problem of reducing the expressions obtained in solving the naval system. Structure of Stokes equations. Development and analysis of an equivalent reduction algorithm based on the theory of chain fractions.

    ??????, добавлен 22.12.2016

  • The values of indicators of the quality of TCP connections specific to each type of Slow HTTP-attacks. A mathematical model formalizing the behavior of the web server when implementing Slow HTTP-attacks of various types, architecture of detection.

    ??????, добавлен 14.01.2017

  • ??????????? ??????? "Big Data" ? ??? ?????????? ? ?????? ? ??????????? ????????? ?????? ? ?????????????? ???????. ??????????? ???????? ?????????? ????????? ?????????? ??????????. ???????? ??????? ???????? ?????? ? ?????????? Big Data ? ?????? ????????.

    ???????? ??????, добавлен 28.09.2015

  • Comparative analysis of prominent message queuing solutions Apache Kafka and RabbitMQ, aimed at identifying the most suitable program for queue management. Evaluation of technology's capability to handle high-throughput scenarios and fault resilience.

    ??????, добавлен 09.12.2024

  • Recommendations on the application of the system of advance passenger information and registration of passenger data (API/PNR). Use as a tool to counter cross-border threats. The role of biometrics in the connection between the document and its owner.

    ??????, добавлен 20.07.2024

  • There have been introduced the most commonly used electrical schemes of biological tissue, as well as their impedance phrases and application areas. An analysis of the adequate schemes and simulation of the MATLAB software environment has been performed.

    ??????, добавлен 17.02.2021

  • Understanding program slicing as a technique for automatically decomposing programs by analyzing its control and data flow. Control flow analysis of binary executables and its problems. Interprocedural slicing using SDG and experimental results.

    ??????, добавлен 11.10.2014

  • ???????? ??????? "Big Data", ???????????? ??????? ???????? ???????? ?????? ??? ??????????????? ??????????????. ????? ? ???????? ???? ????????? Big Data ? ??????????? ???????????? ??????????? ?????? ? ???????? ?? ???????? ???????? ????????????? ??????????.

    ??????, добавлен 24.02.2025

  • Information system research in historic perspective. Research scope on digital transformation. Depicting countries for software trade comparison analysis. Digital transformation conditions in Russia. Japanese school in information system research field.

    ???????????, добавлен 01.09.2018

  • ?????? Data Mining: ???????????? ? ????????????????, ????????????? ? ?????????, ?????? ????????????? ??????, ?????????????. ???????????? ?????????? Data Mining. ??????????? ???????? ??????, ???? ?????????? ????????????????. ??????? ??????????? ??????.

    ???????????, добавлен 27.04.2023

  • Using the analysis of eye movement and gaze direction in online testing systems of students' knowledge. Analysis of creating the same conditions for computer testing for all students and improving the level of knowledge obtained by the test results.

    ??????, добавлен 12.05.2024

  • Memory Hierarchy. Internal or Main memory. Time between presenting the address and getting the valid data. Physical arrangement of bits into words. Cache Read Operation. Typical Cache Organization. Comparison of Cache Sizes. Direct Mapping Cache.

    ???????????, добавлен 03.06.2012

  • Radix-22 Algorithms has been chosen to implement and the different blocks in the architecture. After implementing the blocks, the complex multiplier implementation has been done in four different approaches starting from the basic complex multiplication.

    ????????? ??????, добавлен 01.04.2010

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.