Paper
7 September 2022 Research on data-driven anomaly detection model based on Bi-LSTM
Jianqiao Sheng, Ming Li, Zhang Liang, Yong Ma, Xiaoyin Yu
Author Affiliations +
Proceedings Volume 12329, Third International Conference on Artificial Intelligence and Electromechanical Automation (AIEA 2022); 123290G (2022) https://doi.org/10.1117/12.2646779
Event: Third International Conference on Artificial Intelligence and Electromechanical Automation (AIEA 2022), 2022, Changsha, China
Abstract
In order to make full use of operation and maintenance records for in-depth mining to support management, improve operation and maintenance work management level and execution efficiency, this paper analyzes and preprocesses operation and maintenance log files by studying artificial intelligence technology. A user behavior expression model is constructed from each dimension and log analysis experiments are carried out. Through the research on LSTM and BiLSTM methods, a data-driven abnormal behavior intelligent analysis method based on Bi-LSTM is proposed. The experimental results show that the Bi-LSTM method in this paper has an accuracy of 86% and strong operability in detecting abnormal operation and maintenance operations, and has good performance in detecting abnormal operation and maintenance operations of users. The command line is used as an analysis of abnormal operation and maintenance behavior of audit data.
© (2022) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Jianqiao Sheng, Ming Li, Zhang Liang, Yong Ma, and Xiaoyin Yu "Research on data-driven anomaly detection model based on Bi-LSTM", Proc. SPIE 12329, Third International Conference on Artificial Intelligence and Electromechanical Automation (AIEA 2022), 123290G (7 September 2022); https://doi.org/10.1117/12.2646779
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Detection and tracking algorithms

Neural networks

Data modeling

Analytical research

Mathematical modeling

Statistical analysis

Computer security

Back to Top