Architecture of an integrated java application for log analysis to detect computer attacks in information systems by responding to various security anomalies
Objective. When integrating the ELK stack into an information system, it is necessary to have a duplicate Java application in a closed circuit for hidden anomaly processing. It is necessary to develop the architecture of a Java application for hidden integration with the information system.Method. T...
Saved in:
| Main Authors: | P. I. Sharikov, A. V. Krasov, A. V. Mayorovv |
|---|---|
| Format: | Article |
| Language: | Russian |
| Published: |
Dagestan State Technical University
2025-04-01
|
| Series: | Вестник Дагестанского государственного технического университета: Технические науки |
| Subjects: | |
| Online Access: | https://vestnik.dgtu.ru/jour/article/view/1709 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
LogRESP-Agent: A Recursive AI Framework for Context-Aware Log Anomaly Detection and TTP Analysis
by: Juyoung Lee, et al.
Published: (2025-06-01) -
Research on system log anomaly detection based on deep learning
by: Yidong WANG, et al.
Published: (2019-10-01) -
ELFA-Log: Cross-System Log Anomaly Detection via Enhanced Pseudo-Labeling and Feature Alignment
by: Xiaowei Zhao, et al.
Published: (2025-07-01) -
Improvement of multi-parameter anomaly detection method: Addition of a relational token between parameters
by: Hironori Uchida, et al.
Published: (2025-01-01) -
Anomaly Detection Algorithms for Real-Time Log Data Analysis at Scale
by: Andras Horvath, et al.
Published: (2025-01-01)