Visible to the public Deep Learning Based Event Correlation Analysis in Information Systems

TitleDeep Learning Based Event Correlation Analysis in Information Systems
Publication TypeConference Paper
Year of Publication2021
AuthorsDuman, Atahan, Sogukpinar, Ibrahim
Conference Name2021 6th International Conference on Computer Science and Engineering (UBMK)
Keywordsattention mechanism, Computational modeling, Computer science, Correlation, cyber security, Deep Learning, event log, GRU, i-o systems security, LSTM, Neural networks, Predictive models, pubcrawl, RNN, Scalability, Servers, Software
AbstractInformation systems and applications provide indispensable services at every stage of life, enabling us to carry out our activities more effectively and efficiently. Today, information technology systems produce many alarm and event records. These produced records often have a relationship with each other, and when this relationship is captured correctly, many interruptions that will harm institutions can be prevented before they occur. For example, an increase in the disk I/O speed of a server or a problem may cause the business software running on that server to slow down and cause different results in this slowness. Here, an institution's accurate analysis and management of all event records, and rule-based analysis of the resulting records in certain time periods and depending on certain rules will ensure efficient and effective management of millions of alarms. In addition, it will be possible to prevent possible problems by removing the relationships between events. Events that occur in IT systems are a kind of footprint. It is also vital to keep a record of the events in question, and when necessary, these event records can be analyzed to analyze the efficiency of the systems, harmful interferences, system failure tendency, etc. By understanding the undesirable situations such as taking the necessary precautions, possible losses can be prevented. In this study, the model developed for fault prediction in systems by performing event log analysis in information systems is explained and the experimental results obtained are given.
DOI10.1109/UBMK52708.2021.9559017
Citation Keyduman_deep_2021