×

You are using an outdated browser Internet Explorer. It does not support some functions of the site.

Recommend that you install one of the following browsers: Firefox, Opera or Chrome.

Contacts:

+7 961 270-60-01
ivdon3@bk.ru

  • Modeling of information security system based on analysis of system logs

    The article describes the method of identification of abnormal actions of users of corporate computer systems based on the analysis of log files. The proposed method is based on the clustering of system log events by The IPLoM algorithm and the construction of an event count matrix for its further analysis using machine learning methods.

    Keywords: machine learning, information security, data analysis, syslog monitoring, log file, IPLoM