Finding Gold in the Sand: Identifying Anomaly Indicators Though Huge Amount Security Logs

Author(s):  
Aidong Xu ◽  
Lin Chen ◽  
Yixin Jiang ◽  
Huahui Lv ◽  
Hang Yang ◽  
...  
Keyword(s):  
Author(s):  
Manbir Sandhu ◽  
Purnima, Anuradha Saini

Big data is a fast-growing technology that has the scope to mine huge amount of data to be used in various analytic applications. With large amount of data streaming in from a myriad of sources: social media, online transactions and ubiquity of smart devices, Big Data is practically garnering attention across all stakeholders from academics, banking, government, heath care, manufacturing and retail. Big Data refers to an enormous amount of data generated from disparate sources along with data analytic techniques to examine this voluminous data for predictive trends and patterns, to exploit new growth opportunities, to gain insight, to make informed decisions and optimize processes. Data-driven decision making is the essence of business establishments. The explosive growth of data is steering the business units to tap the potential of Big Data to achieve fueling growth and to achieve a cutting edge over their competitors. The overwhelming generation of data brings with it, its share of concerns. This paper discusses the concept of Big Data, its characteristics, the tools and techniques deployed by organizations to harness the power of Big Data and the daunting issues that hinder the adoption of Business Intelligence in Big Data strategies in organizations.


2001 ◽  
pp. 99-106 ◽  
Author(s):  
Yu. N. Neshatayev

If one processes a huge amount of data when es­tabli­shing the vegetation classification, it appears necessary to use the uniform algorithms of analysis. Such goals as distinguishing the reliable community types (associations or other syntaxa) involve the operational reduction of either the species list, or (more seldom) the sample plot set. This is especially useful for the analysis of multi­specific communities of meadows, steppes, or another types of markedly continuous polydominant vegetation with «fuzzy» structure of the herb layer.


2020 ◽  
Author(s):  
Shunsuke Ikeda ◽  
Miho Fuyama ◽  
Hayato Saigo ◽  
Tatsuji Takahashi

Machine learning techniques have realized some principal cognitive functionalities such as nonlinear generalization and causal model construction, as far as huge amount of data are available. A next frontier for cognitive modelling would be the ability of humans to transfer past knowledge to novel, ongoing experience, making analogies from the known to the unknown. Novel metaphor comprehension may be considered as an example of such transfer learning and analogical reasoning that can be empirically tested in a relatively straightforward way. Based on some concepts inherent in category theory, we implement a model of metaphor comprehension called the theory of indeterminate natural transformation (TINT), and test its descriptive validity of humans' metaphor comprehension. We simulate metaphor comprehension with two models: one being structure-ignoring, and the other being structure-respecting. The former is a sub-TINT model, while the latter is the minimal-TINT model. As the required input to the TINT models, we gathered the association data from human participants to construct the ``latent category'' for TINT, which is a complete weighted directed graph. To test the validity of metaphor comprehension by the TINT models, we conducted an experiment that examines how humans comprehend a metaphor. While the sub-TINT does not show any significant correlation, the minimal-TINT shows significant correlations with the human data. It suggests that we can capture metaphor comprehension processes in a quite bottom-up manner realized by TINT.


2019 ◽  
Author(s):  
Laurent Chrzanovski ◽  
Roksana Chowaniec

At Akrai, in South-Eastern Sicily, the UW excavations unveiled a huge amount of small, wheel-made, beige-slipped lamps belonging to the Roman Republican Ricci type C. The most important elements witnessed by this research are both the role those lamps played – laid unused in votive deposits but also used in daily life – and their permanence way after times when they disappeared elsewhere in the Roman world. As a matter of fact, they derivate from an old form and they knew a floruit during the 3rd and 2nd century BC, while the last individuals seem to have been produced until the reign of Augustus.


2012 ◽  
Vol 19 (2) ◽  
Author(s):  
Rosmawani Che Hashim ◽  
Ahmad Azam Othman ◽  
Akhtarzaite Abdul Aziz

The term letter of credit (LC) is not uncommon in international trade as it is the most frequently used method of payment by seller and buyer in their sales contract. LC serves its significant role by facilitating payment between buyer and seller from different countries, who are always prejudiced towards each other on the issue of payment, especially when the deal involves a huge amount of money. By using LC, the seller and buyer will be represented by their own bankers whose function, among others is to issue an LC for the buyer and pay on presentation of seller’s documents which strictly comply to LC requirements. It is well-known that LC is governed by the principle of autonomy or also referred to as the principle of independence1 which indicates LC, being a contract of payment is totally separate from the underlying sales contract. Banks are concerned with documents only and not with the goods. LC transaction can be governed by the Uniform Custom and Practice for Documentary Credit, known as the UCP through express incorporation which provides the rules relating to LC matters and is adopted in almost all LC transactions. This paper discusses the nature, background and significance of principle of autonomy in LC transaction. In elaborating the provisions on the principle of autonomy in the UCP 600, comparisons between relevant articles in the UCP 500 are highlighted. The discussion also focuses on relevant case law and on the application of the autonomy principle in conventional and Islamic LC. The paper concludes with the finding that Malaysian bankers fully subscribe to the principle of autonomy as outlined by the UCP 600.


Author(s):  
Muhammad Waqar Khan ◽  
Muhammad Asghar Khan ◽  
Muhammad Alam ◽  
Wajahat Ali

<p>During past few years, data is growing exponentially attracting researchers to work a popular term, the Big Data. Big Data is observed in various fields, such as information technology, telecommunication, theoretical computing, mathematics, data mining and data warehousing. Data science is frequently referred with Big Data as it uses methods to scale down the Big Data. Currently<br />more than 3.2 billion of the world population is connected to internet out of which 46% are connected via smart phones. Over 5.5 billion people are using cell phones. As technology is rapidly shifting from ordinary cell phones towards smart phones, therefore proportion of using internet is also growing. There<br />is a forecast that by 2020 around 7 billion people at the globe will be using internet out of which 52% will be using their smart phones to connect. In year 2050 that figure will be touching 95% of world population. Every device connect to internet generates data. As majority of the devices are using smart phones to<br />generate this data by using applications such as Instagram, WhatsApp, Apple, Google, Google+, Twitter, Flickr etc., therefore this huge amount of data is becoming a big threat for telecom sector. This paper is giving a comparison of amount of Big Data generated by telecom industry. Based on the collected data<br />we use forecasting tools to predict the amount of Big Data will be generated in future and also identify threats that telecom industry will be facing from that huge amount of Big Data.</p>


Itinerario ◽  
2009 ◽  
Vol 33 (2) ◽  
pp. 17-27 ◽  
Author(s):  
Már Jónsson

On 2 January 1625, the English ambassador Robert Anstruther met with King Christian IV of Norway and Denmark and requested his participation in a union of Protestant states against Emperor Ferdinand II and the Catholic League in Germany. Within three days, King Christian proposed to contribute five thousand soldiers for one year, as part of an army of almost thirty thousand men. In early June, despite opposition from the Danish Council of State, reluctant to put a huge amount of money into foreign affairs, Christian decided to join what he called “the war for the defence of Lower Saxony”. He then headed an army of mercenaries southwards through Lower Saxony, secured all crossings over the river Weser and prepared to confront the Catholic forces. On 29 November, it was decided that Denmark would be in charge of military operations in Northern Germany, whereas England and the United Provinces would provide a monthly subsidy. The political and military prospects for Denmark were excellent, to say the least. It had the fourth strongest navy in Europe (after Spain and the two new allies), and only a few years before the Danish warships had been described by a French observer as “merveilles de l'océan”. A small standing army of two regiments had recently been established and Denmark was the fourth European state to do so after France, Spain and the neighbouring Sweden.


Proceedings ◽  
2021 ◽  
Vol 77 (1) ◽  
pp. 17
Author(s):  
Andrea Giussani

In the last decade, advances in statistical modeling and computer science have boosted the production of machine-produced contents in different fields: from language to image generation, the quality of the generated outputs is remarkably high, sometimes better than those produced by a human being. Modern technological advances such as OpenAI’s GPT-2 (and recently GPT-3) permit automated systems to dramatically alter reality with synthetic outputs so that humans are not able to distinguish the real copy from its counteracts. An example is given by an article entirely written by GPT-2, but many other examples exist. In the field of computer vision, Nvidia’s Generative Adversarial Network, commonly known as StyleGAN (Karras et al. 2018), has become the de facto reference point for the production of a huge amount of fake human face portraits; additionally, recent algorithms were developed to create both musical scores and mathematical formulas. This presentation aims to stimulate participants on the state-of-the-art results in this field: we will cover both GANs and language modeling with recent applications. The novelty here is that we apply a transformer-based machine learning technique, namely RoBerta (Liu et al. 2019), to the detection of human-produced versus machine-produced text concerning fake news detection. RoBerta is a recent algorithm that is based on the well-known Bidirectional Encoder Representations from Transformers algorithm, known as BERT (Devlin et al. 2018); this is a bi-directional transformer used for natural language processing developed by Google and pre-trained over a huge amount of unlabeled textual data to learn embeddings. We will then use these representations as an input of our classifier to detect real vs. machine-produced text. The application is demonstrated in the presentation.


2013 ◽  
Vol 771 ◽  
pp. 75-81
Author(s):  
Nai Chang Dai ◽  
Sheng Dong Yu

t is possible to get electroforming deposit with numerous special functions by adoption of traditional electroforming technique, but in which there are defects such as uneven electroforming deposit and unstable performance, etc. In order to enhance the quality and speed of electroforming deposit, this article has proposed the particle flow erosion precision electroforming technology, particle flows such as huge amount of micro glass bead is used in the process of electro-deposit for erosion of electroforming deposit surface, so that micro glass beads continuously abrade and impact cathode surface. As indicated in electroforming test of metallic nickel, in comparison with traditional electroforming technology, particle flow erosion precision electroforming technology can effectively change the microscopic structure of electroforming deposit, refine grain and realize evener distribution of grains, so as to reduce the diffracted intensity of all crystal faces and enhance mechanical property of electroforming deposit.


2012 ◽  
Vol 620 ◽  
pp. 469-473 ◽  
Author(s):  
Norhashimah Ramli ◽  
Mohammad Hafizuddin Haji Jumali ◽  
Wan Safizah Wan Salim

Dredging along Kuala Perlis Jetty results in huge amount of marine sediments which has thrown considerable challenge for disposal. This research was conducted to characterize dredged marine sediment which was collected at Kuala Perlis Jetty as potential raw material for brick production. Three different characterizations were performed namely XRF, XRD and FTIR. XRF analysis showed the presence of SiO2 and Al2O3 as major quantities. Low concentration of heavy metals namely As, Cr, Cu, Pb, Ni and Zn presence in the sediment comply the US EPA guideline for brick production. XRD analysis indicated the presence of quartz as primary mineral while kaolinite and illite also present as secondary and ternary phases. FTIR analysis identified various form of minerals presence in the samples which strongly supported XRD results.


Sign in / Sign up

Export Citation Format

Share Document