Comparative analysis of system logs and streaming data anomaly detection algorithms

Comparison of several common approaches to the analysis of system logs and streaming data generated en masse by the company's IT infrastructure. Characteristics of model-based anomaly search algorithms and hierarchical temporary memory algorithms.

Подобные документы

  • The article is intended to analyse the development of the institute of personal data protection in the world identify ways to adapt the national legislation of Ukraine to the current personal data protection standards of the EU. To carry out the research.

    статья, добавлен 19.09.2024

  • The use of the NRL Protocol Analyzer and Gavin Lowe’s use of the model checker FDR to analyze the Needham-Schroeder public key protocol. This is used as a basis to compare and contrast the two systems and out possible future directions for research.

    статья, добавлен 15.09.2012

  • Using C ++ Builder to create a binary file. The development of a dynamic array structure of the binary data using the individual functions, located in the library user. The general analysis of the data. Create screensaver with information about the task.

    курсовая работа, добавлен 13.07.2014

  • A new model of the take-off weight of the aircraft determining process and the weight distribution of passengers’ law. A simulation of the operations in the preparation for departure process. The effect of weight on the passenger aircraft alignment.

    статья, добавлен 27.06.2016

  • Spectral embedding and spectral clustering as common methods for non-linear dimensionality reduction and clustering of complex high dimensional datasets. Asymptotics of the diffusion distances and diffusion maps. Clustering of a mixture of gaussians.

    учебное пособие, добавлен 08.02.2013

  • The research paper aims to develop an Search Engine Optimization for commercial site. The paper considers a model of analysis of Search Engine Optimization examples for competing sites. The level of relevance of Search Engine Optimization is determined.

    статья, добавлен 22.09.2022

  • The terms of the security of critical infrastructure. Construction and characterization of a model of security management of critical infrastructure, allowing you to easily determine how the criticality of certain infrastructure, General infrastructure.

    статья, добавлен 28.02.2016

  • Creation of an automated system for collecting information for the incoherent scattering radar. Characteristics of the composition of parameters that affect the control effect. Requirements for the parameters of the transmitting and receiving equipment.

    статья, добавлен 30.10.2016

  • The approaches to the information system construction for analyzing work complexity. Business logic and access logic to the database, as a basis of software implementation and in future presentation logic. The block diagram of the information system.

    статья, добавлен 26.06.2016

  • This paper explores the development and application of a long-short-term memory model for virtual distributed system control optimization using the TensorFlow and Keras frameworks. In the context of the rapid development of information technologies.

    статья, добавлен 18.09.2024

  • Применение методов классификации, моделирования и прогнозирования, основанных на применении деревьев решений, искусственных нейронных сетей, генетических алгоритмов, эволюционного программирования. Задачи и возможности Data Miner в Statistica 8.

    реферат, добавлен 19.12.2014

  • The support was the key to effective implementation of advanced technologies and systemic implementation scale of China’s digital policy. A comparative analysis of the transformational processes of digitalization of China and Ukraine was carried out.

    статья, добавлен 21.08.2022

  • The opportunities of the GeoGebra dynamic geometry environment. Capabilities of the system for creating drawings, tables of experimental data and their application in conducting research work. The examples of solving some elementary geometry problems.

    статья, добавлен 25.05.2017

  • Development of a new algorithm for registration of remote sensing images based on landmarks. Mathematical model of elementary and flat objects of the image based on contour analysis. An solution that allows you to analyze a specific image object.

    статья, добавлен 27.05.2021

  • The methods of data protection in local and global network. The functions of antivirus programs. The server side of web protection. The aspects of data transfer in big company. Password management. Internet security from different hacking and infection.

    контрольная работа, добавлен 07.08.2017

  • Пошук шляхів досягнення конкурентних переваг та стабільності компаній на ринку. Визначення етапів впровадження та проблем використання Big Data в сучасному бізнесі. Забезпечення конфіденційності при зберіганні, обробці й аналізі великих обсягів даних.

    статья, добавлен 18.06.2024

  • Research and characteristic of the main features of the recommender system is knowledge-based recommendation. Acquaintance with the advantages and disadvantages of english wikipedia model, which is the most appropriate model for the topic recommender.

    курсовая работа, добавлен 25.06.2017

  • Understanding program slicing as a technique for automatically decomposing programs by analyzing its control and data flow. Control flow analysis of binary executables and its problems. Interprocedural slicing using SDG and experimental results.

    статья, добавлен 11.10.2014

  • Micali-Reyzin computational model. Target circuit and block cipher. Analysis of single point leakages. Towards the analysis of real constructions. Definition of security against side-channel attacks. The initialize a PRNG securely with a public seed.

    статья, добавлен 15.09.2012

  • Analysis of developing classification task based on structural connectomes. Custom metrics based on random walk logarithms. Performance metric and hyperparameters grid search. Results obtained for this functional connectivity based parcellation scheme.

    дипломная работа, добавлен 27.08.2016

  • Research of aspects of information protection procedure development on the basis of software development. Characteristics of the Raspberry PI platform and the Raspbian system. Possibilities of influence of third-party means on management of object.

    статья, добавлен 29.10.2020

  • Значение понятия "скрытые знания". Определение сути методов Data mining. Язык запросов к базам данных. Выявление возможностей для создания, изменения и извлечения хранимых данных. Data mining и искусственный интеллект. Задачи кластеризации и ассоциации.

    контрольная работа, добавлен 14.04.2014

  • Огляд досвіду впровадження технології Big Data в електронній дистрибуції та бізнес-аналітиці. Означення перспективних проєктів в книжковій індустрії, що базуються на цій технології. Спрощення процесів управління галуззю при упровадженні Big Data.

    статья, добавлен 15.04.2024

  • Protection from disclosure to unauthorised persons integrity. Maintaining data consistency. Assurance of identity of person or originator of data non-repudiation. Conventional encryption: uses a shared key. Digital Signatures and especially their use.

    учебное пособие, добавлен 08.03.2014

  • The NCBI Data Model. Submitting DNA Sequences to the Databases. Genomic Mapping and Mapping Databases. Information Retrieval from Biological Databases. Creation and Analysis of Protein Multiple Sequence Alignments. Sequence Assembly, Finishing Methods.

    учебное пособие, добавлен 25.11.2013

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.