Skip to main content

Showing 1–8 of 8 results for author: Landauer, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2504.04877  [pdf, other

    cs.LG

    System Log Parsing with Large Language Models: A Review

    Authors: Viktor Beck, Max Landauer, Markus Wurzenberger, Florian Skopik, Andreas Rauber

    Abstract: Log data provides crucial insights for tasks like monitoring, root cause analysis, and anomaly detection. Due to the vast volume of logs, automated log parsing is essential to transform semi-structured log messages into structured representations. Recent advances in large language models (LLMs) have introduced the new research field of LLM-based log parsing. Despite promising results, there is no… ▽ More

    Submitted 15 May, 2025; v1 submitted 7 April, 2025; originally announced April 2025.

    Comments: 36 pages, 11 figures

    ACM Class: I.2; I.5

  2. arXiv:2503.02402  [pdf, other

    cs.CR

    Trace of the Times: Rootkit Detection through Temporal Anomalies in Kernel Activity

    Authors: Max Landauer, Leonhard Alton, Martina Lindorfer, Florian Skopik, Markus Wurzenberger, Wolfgang Hotwagner

    Abstract: Kernel rootkits provide adversaries with permanent high-privileged access to compromised systems and are often a key element of sophisticated attack chains. At the same time, they enable stealthy operation and are thus difficult to detect. Thereby, they inject code into kernel functions to appear invisible to users, for example, by manipulating file enumerations. Existing detection approaches are… ▽ More

    Submitted 4 March, 2025; originally announced March 2025.

  3. arXiv:2501.11685  [pdf, other

    cs.CR

    Towards Improving IDS Using CTF Events

    Authors: Manuel Kern, Florian Skopik, Max Landauer, Edgar Weippl

    Abstract: In cybersecurity, Intrusion Detection Systems (IDS) serve as a vital defensive layer against adversarial threats. Accurate benchmarking is critical to evaluate and improve IDS effectiveness, yet traditional methodologies face limitations due to their reliance on previously known attack signatures and lack of creativity of automated tests. This paper introduces a novel approach to evaluating IDS th… ▽ More

    Submitted 20 January, 2025; originally announced January 2025.

  4. arXiv:2408.15645  [pdf, other

    cs.CR

    Red Team Redemption: A Structured Comparison of Open-Source Tools for Adversary Emulation

    Authors: Max Landauer, Klaus Mayer, Florian Skopik, Markus Wurzenberger, Manuel Kern

    Abstract: Red teams simulate adversaries and conduct sophisticated attacks against defenders without informing them about used tactics in advance. These interactive cyber exercises are highly beneficial to assess and improve the security posture of organizations, detect vulnerabilities, and train employees. Unfortunately, they are also time-consuming and expensive, which often limits their scale or prevents… ▽ More

    Submitted 28 August, 2024; originally announced August 2024.

  5. A Critical Review of Common Log Data Sets Used for Evaluation of Sequence-based Anomaly Detection Techniques

    Authors: Max Landauer, Florian Skopik, Markus Wurzenberger

    Abstract: Log data store event execution patterns that correspond to underlying workflows of systems or applications. While most logs are informative, log data also include artifacts that indicate failures or incidents. Accordingly, log data are often used to evaluate anomaly detection techniques that aim to automatically disclose unexpected or otherwise relevant system behavior patterns. Recently, detectio… ▽ More

    Submitted 6 September, 2023; originally announced September 2023.

    Journal ref: Proceedings of the ACM on Software Engineering (FSE 2024)

  6. Introducing a New Alert Data Set for Multi-Step Attack Analysis

    Authors: Max Landauer, Florian Skopik, Markus Wurzenberger

    Abstract: Intrusion detection systems (IDS) reinforce cyber defense by autonomously monitoring various data sources for traces of attacks. However, IDSs are also infamous for frequently raising false positives and alerts that are difficult to interpret without context. This results in high workloads on security operators who need to manually verify all reported alerts, often leading to fatigue and incorrect… ▽ More

    Submitted 24 August, 2023; originally announced August 2023.

    Journal ref: CSET 2024: Proceedings of the 17th Cyber Security Experimentation and Test Workshop

  7. Deep Learning for Anomaly Detection in Log Data: A Survey

    Authors: Max Landauer, Sebastian Onder, Florian Skopik, Markus Wurzenberger

    Abstract: Automatic log file analysis enables early detection of relevant incidents such as system failures. In particular, self-learning anomaly detection techniques capture patterns in log data and subsequently report unexpected log event occurrences to system operators without the need to provide or manually model anomalous scenarios in advance. Recently, an increasing number of approaches leveraging dee… ▽ More

    Submitted 15 May, 2023; v1 submitted 8 July, 2022; originally announced July 2022.

    Journal ref: Machine Learning with Applications, vol. 12 (2023)

  8. Maintainable Log Datasets for Evaluation of Intrusion Detection Systems

    Authors: Max Landauer, Florian Skopik, Maximilian Frank, Wolfgang Hotwagner, Markus Wurzenberger, Andreas Rauber

    Abstract: Intrusion detection systems (IDS) monitor system logs and network traffic to recognize malicious activities in computer networks. Evaluating and comparing IDSs with respect to their detection accuracies is thereby essential for their selection in specific use-cases. Despite a great need, hardly any labeled intrusion detection datasets are publicly available. As a consequence, evaluations are often… ▽ More

    Submitted 16 March, 2022; originally announced March 2022.

    Journal ref: IEEE Transactions on Dependable and Secure Computing (2022)