Anomaly Detection in Application Logs with Attention Mechanism-Enhanced LSTM

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

As digital technology continues to spread across various sectors, the need for robust cybersecurity becomes increasingly critical. One way to ensure security is by identifying potential threats and anomalies through application log analysis. Traditional methods that rely only on rule-based detection are often insufficient to adapt to new attack patterns. This research addresses these limitations by integrating rule-based detection with Sigma rules into the ELK (Elasticsearch, Logstash, Kibana) platform to generate a structured dataset. Logs are collected from monitored applications and categorized into normal, system anomalies, or user anomalies. A modified long short-term memory (lstm) model with an attention mechanism is trained on the labeled dataset to improve anomaly detection. Experimental results show that the LSTM model with the attention mechanism achieves the highest performance, with an accuracy of 98.52%, precision of 98.66%, recall of 98.52%, and an F1-score of 98.55%, outperforming RNN, GRU, and standard LSTM models in anomaly detection.

Original languageEnglish
Title of host publication2025 5th International Conference on Intelligent Technologies, CONIT 2025
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9798331522339
DOIs
Publication statusPublished - 2025
Event5th IEEE International Conference on Intelligent Technologies, CONIT 2025 - Karnataka, India
Duration: 20 Jun 202522 Jun 2025

Publication series

Name2025 5th International Conference on Intelligent Technologies, CONIT 2025

Conference

Conference5th IEEE International Conference on Intelligent Technologies, CONIT 2025
Country/TerritoryIndia
CityKarnataka
Period20/06/2522/06/25

Keywords

  • anomaly detection
  • application logs
  • cybersecurity
  • deep learning
  • long short term memory
  • rule-based

Fingerprint

Dive into the research topics of 'Anomaly Detection in Application Logs with Attention Mechanism-Enhanced LSTM'. Together they form a unique fingerprint.

Cite this