Anomaly detection based on log data has become an important research field in recent years. Particularly valuable are discrete event logs, which contain chronologically ordered event information and therefore allow to perform time-series analysis and event aggregation, which are critical to spot anomalies in a system [1]. Oftentimes, event sequences are far more expressive than analyzing events in isolation.
The Windows Event Log (WEL), if properly configured, contains a range of information about application-, security- and system-specific activities [2]. Especially the Windows Security Log stores valuable insights about login/logout activity, policy changes, privilege use and more [3].
The main objectives of this project are as follows:
Helpful sources:
https://www.splunk.com/en_us/training/splunk-fundamentals.html
https://github.com/sbousseaden/EVTX-ATTACK-SAMPLES
References:
[1] X. Wang, L. Yang, D. Li, L. Ma, Y. He, J. Xiao, J. Liu and Y. Yang, "MADDC: Multi-Scale Anomaly Detection, Diagnosis and Correction for Discrete Event Logs," Proceedings of the 38th Annual Computer Security Applications Conference, pp. 769-784, 2022.
[2] K. Steverson, C. Carlin, J. Mullin and M. Ahiskali, "Cyber Intrusion Detection using Natural Language Processing on Windows Event Logs," IEEE International Conference on Military Communication and Information Systems (ICMCIS), pp. 1-7, 2021.
[3] "Ultimate IT Security," 2023. [Online]. Available: https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/default.aspx. [Accessed 7 September 2023].
[4] T. M. Corporation, "MITRE ATT&CK," 2023. [Online]. Available: https://attack.mitre.org/. [Accessed 7 September 2023].
Supervisors: Thomas Grübl
back to the main page