{"id":222153,"date":"2021-05-12T11:55:15","date_gmt":"2021-05-12T09:55:15","guid":{"rendered":"https:\/\/www.intrinsec.com\/?p=222153"},"modified":"2021-05-12T11:55:15","modified_gmt":"2021-05-12T09:55:15","slug":"log-loss-machine-learning","status":"publish","type":"post","link":"https:\/\/www.intrinsec.com\/en\/log-loss-machine-learning\/","title":{"rendered":"Log loss detection and machine learning: a possible use case with AI?"},"content":{"rendered":"<p>For <a href=\"https:\/\/www.intrinsec.com\/en\/soc-securite-operationnelle\/\">SOC<\/a> analysts, it is very important to know when <strong>a loss of logs is occurring or may have occurred<\/strong>. When SIEMs no longer receive logs from its usual sending hosts, <strong>the detection\/correlation rules cannot be properly applied<\/strong>. It is then likely in this type of scenario, that there is a <strong>late awareness or even a total absence of awareness<\/strong> by the analysts <strong>if one or more security incidents could have occurred<\/strong>. The same is true if an attacker has managed to take control of a host or user account to <strong>stop all logging processes<\/strong> so that his <strong>illegitimate behavior goes unnoticed<\/strong>.<\/p>\n\n\n\n<p><strong>Artificial intelligence<\/strong> is seen as a very beneficial advance to our society, allowing us to <strong>predict our needs<\/strong> and thus <strong>respond with anticipation<\/strong>n. Its ability to understand and analyze a given context can help <strong>detect anomalies or unusual behaviors<\/strong> and thus, can it <strong>strengthen the detection<\/strong> for the case of lost logs on hosts? This is what we will discover in this article, which is broken down into five parts:<\/p>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<ol class=\"wp-block-list\"><li>Existing calculation methods<\/li><li>Application of machine learning in Splunk with MLTK<\/li><li>Limitations of detection with MLTK<\/li><li>Another more classical and cognitive approach<\/li><li>The advantages and disadvantages<\/li><\/ol>\n<\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<h1 class=\"wp-block-heading\" id=\"h-existing-calculation-methods\">Existing calculation methods<\/h1>\n\n\n\n<p>Considering the very negative effect that lost logs can have on the security of a company&#039;s systems, it is essential to know how to detect them. There are <strong>three methods<\/strong> that can be used to solve this problem.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-1st-method-fixed-threshold\">1st method: fixed threshold<\/h2>\n\n\n\n<p>This method consists of estimating and defining <strong>a fixed maximum time threshold for the non-receipt of logs<\/strong> globally or for each host. <strong>As soon as an entry exceeds the threshold, the alert is triggered<\/strong>.<\/p>\n\n\n\n<p>This approach can be effective but the thresholds may not be accurately matched to <strong>the variation in host log appearance during certain periods<\/strong>, and therefore <strong>too high a tolerance may be applied or vice versa<\/strong>. This is an approach that ends up requiring critical analysis by analysts, so it is <strong>not as effective and reliable<\/strong> because it can <strong>trigger a lot of false alerts or ignore log losses<\/strong> where there should be none.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2021\/05\/1-1.png\" alt=\"\" class=\"wp-image-222154\" \/><\/figure><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">2nd method: standard deviation<\/h2>\n\n\n\n<p>The standard deviation method, which consists of <strong>calculating the variation in the appearance of logs around the historical average<\/strong> to define more <strong>precise automated thresholds<\/strong> in globally or for each host.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2021\/05\/2021-05-06-14_18_53-Article-FR-Detection-des-pertes-de-journaux-V3.docx-Lecture-seule-Word-1.png\" alt=\"\" class=\"wp-image-222155\" \/><\/figure><\/div>\n\n\n\n<p>While this may seem to <strong>limit the problems arising from the first method<\/strong> outlined above, an <strong>effective limitation<\/strong> may occur when there is a <strong>trend or seasonality<\/strong> to the disappearance of logs from a host. Tea <strong>historical average<\/strong> will not accurately represent the <strong>true average<\/strong> for a given period of time and, as a result, the calculated thresholds may not <strong>properly detect possible log loss<\/strong>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">3rd method: the error of the standard deviation<\/h2>\n\n\n\n<p>The method of the error of the standard deviation which is <strong>similar to the previous one<\/strong> but which aims at <strong>calculating the forecast error allowing to obtain an average error<\/strong>. It allows to know several standard deviations for the definition of several thresholds for several periods for each host.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2021\/05\/2021-05-06-14_19_09-Article-FR-Detection-des-pertes-de-journaux-V3.docx-Lecture-seule-Word-1.png\" alt=\"\" class=\"wp-image-222156\" \/><\/figure><\/div>\n\n\n\n<p>This <strong>smarter detection<\/strong> method analyzes the forecast error variance instead of simply monitoring the occurrence of logs around the historical average, and thus <strong>detects threshold overruns much more accurately and reduces them to a more plausible value<\/strong>. Therefore, this method is <strong>best<\/strong> to address the problem of log loss detection and can be <strong>directly employed and adapted<\/strong> through <strong>Splunk&#039;s MLTK application<\/strong>.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Application of machine learning in Splunk with MLTK<\/h1>\n\n\n\n<h2 class=\"wp-block-heading\">What is MLTK?<\/h2>\n\n\n\n<p><strong>Machine Learning Toolkit<\/strong> is a <strong>free<\/strong> application that installs on the Splunk platform to <strong>extend its functionality and provide a guided machine learning modeling environment<\/strong> with:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>A showcase with a machine <strong>learning toolbox<\/strong>. It contains <strong>ready-to-use examples with real datasets<\/strong> to quickly and easily understand how <strong>the methods and algorithms available work<\/strong>.<\/li><li>Year <strong>experimentation assistant<\/strong> to design in a guided way your own models and test them.<\/li><li>An SPL search tab integrating <strong>MLTK&#039;s own commands<\/strong> allowing you to test and adapt your own models.<\/li><li><strong>43 algorithms available and usable<\/strong> directly from the application and also a <strong>python library<\/strong> containing <strong>several hundred open source algorithms<\/strong> for numerical computation in free access.<\/li><\/ul>\n\n\n\n<p>MLTK can therefore meet different objectives such as:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Predict numerical fields (linear regression)<\/li><li>Predict categorical fields (logistic regression)<\/li><li>Detect numerical outliers (distribution statistics)<\/li><li>Detect categorical outliers (probabilistic measures)<\/li><li>Time series forecasting<\/li><li>Clustering numerical events<\/li><\/ul>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2021\/05\/2021-05-06-14_19_21-Article-FR-Detection-des-pertes-de-journaux-V3.docx-Lecture-seule-Word-1.png\" alt=\"\" class=\"wp-image-222157\" \/><\/figure><\/div>\n\n\n\n<p>Among the aforementioned objectives that MLTK can satisfy, only one machine learning model can address the detection of log loss with the error of the standard deviation method<strong>d: outlier detection<\/strong>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Outlier detection for missing hosts<\/h2>\n\n\n\n<p>Outlier detection is <strong>the identification of data that deviates from a data set<\/strong>. To obtain the data in this use case, it is sufficient to record <strong>the time difference between each log<\/strong> issued by the host and to <strong>clean the null values<\/strong> that may distort the results. Then, <strong>we calculate the error of the standard deviation for each of the data to detect the outliers<\/strong>.<\/p>\n\n\n\n<p>Here is an example of a prediction model in MLTK on log loss for a single host. Tea <strong>outliers<\/strong> (<strong>yellow dots<\/strong>) are the data points that fall <strong>outside the outer envelope<\/strong> (<strong>light blue area<\/strong>). The value on the right side of the graph (<strong>14<\/strong>) indicates the <strong>total number of outliers<\/strong> :<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2021\/05\/2021-05-06-14_19_38-Article-FR-Detection-des-pertes-de-journaux-V3.docx-Lecture-seule-Word-1.png\" alt=\"\" class=\"wp-image-222158\" \/><\/figure><\/div>\n\n\n\n<p>We notice that <strong>the outlier envelope<\/strong> or the calculated thresholds <strong>follow rather well the general shape of the curve<\/strong> but that <strong>a certain number of outliers are still found<\/strong>.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Limitation of detection with MLTK<\/h1>\n\n\n\n<p>While this method <strong>allows for the seasonality of log loss<\/strong>, it still requires <strong>some consistency<\/strong>. Some hosts may <strong>transmit very irregularly during any period<\/strong> and thus <strong>create false outliers<\/strong> in the data sets. <\/p>\n\n\n\n<p>For example, this is the case for this host which, over a period of 2 to 30 days, will keep a high <strong>coefficient of variation<\/strong>. This coefficient corresponds to <strong>the relative measure of the dispersion of the data around the mean<\/strong> It is equal to the <strong>ratio of the standard deviation to the mean<\/strong>. <strong>The higher the value of the coefficient of variation, the greater the dispersion around the mean<\/strong>. Below, the coefficients of variation are greater than 1.5, ie the standard deviation is more than 1.5 times the mean. <strong>A standard deviation is considered to be high when it is half the mean<\/strong>, so it is relatively high in this example:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><td><strong>Periods<\/strong><\/td><td><strong>2 days<\/strong><\/td><td><strong>7_days<\/strong><\/td><td><strong>14 days<\/strong><\/td><td><strong>21 days<\/strong><\/td><td><strong>30 days<\/strong><\/td><\/tr><\/thead><tbody><tr><td>Total Frequency<\/td><td>144<\/td><td>404<\/td><td>902<\/td><td>1338<\/td><td>1921<\/td><\/tr><tr><td>Total Population (xf)<\/td><td>258591<\/td><td>688776<\/td><td>1295373<\/td><td>1900168<\/td><td>2653629<\/td><\/tr><tr><td>Median (\u03bc)<\/td><td>600<\/td><td>600<\/td><td>600<\/td><td>600<\/td><td>600<\/td><\/tr><tr><td>Average (\u2d1f)<\/td><td>1795.77<\/td><td>1708.09<\/td><td>1436.11<\/td><td>1420.16<\/td><td>1381.38<\/td><\/tr><tr><td>x min<\/td><td>598<\/td><td>580<\/td><td>559<\/td><td>559<\/td><td>559<\/td><\/tr><tr><td>x max<\/td><td>28799<\/td><td>28799<\/td><td>31199<\/td><td>37204<\/td><td>37204<\/td><\/tr><tr><td>Standard Deviation (\u03c3)<\/td><td>3301<\/td><td>2869<\/td><td>2416<\/td><td>2446<\/td><td>2304<\/td><\/tr><tr><td>Coefficient of variation<\/td><td>1.84<\/td><td>1.68<\/td><td>1.68<\/td><td>1.72<\/td><td>1.67<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>The same is true if you focus on specific days of the week over a 30-day period:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><td><strong>Periods<\/strong><\/td><td><strong>Monday<\/strong><\/td><td><strong>Tuesday<\/strong><\/td><td><strong>Wednesday<\/strong><\/td><td><strong>Thursday<\/strong><\/td><td><strong>Friday<\/strong><\/td><td><strong>Saturday<\/strong><\/td><td><strong>Sunday<\/strong><\/td><\/tr><\/thead><tbody><tr><td>Total frequency<\/td><td>403<\/td><td>403<\/td><td>356<\/td><td>328<\/td><td>268<\/td><td>90<\/td><td>73<\/td><\/tr><tr><td>Total population<\/td><td>431224<\/td><td>407397<\/td><td>344989<\/td><td>346248<\/td><td>390887<\/td><td>383993<\/td><td>386387<\/td><\/tr><tr><td>Median<\/td><td>600<\/td><td>600<\/td><td>600<\/td><td>600<\/td><td>601<\/td><td>2104.5<\/td><td>3000<\/td><\/tr><tr><td>Average<\/td><td>1070.03<\/td><td>1010.91<\/td><td>969.07<\/td><td>1055.63<\/td><td>1318.62<\/td><td>4266.59<\/td><td>5292.97<\/td><\/tr><tr><td>Minimum value<\/td><td>595<\/td><td>559<\/td><td>580<\/td><td>592<\/td><td>594<\/td><td>590<\/td><td>598<\/td><\/tr><tr><td>Maximum value<\/td><td>7200<\/td><td>7200<\/td><td>8400<\/td><td>10800<\/td><td>8399<\/td><td>37204<\/td><td>31199<\/td><\/tr><tr><td>Standard deviation<\/td><td>988<\/td><td>835<\/td><td>794<\/td><td>1056<\/td><td>1379<\/td><td>5771<\/td><td>6871<\/td><\/tr><tr><td>Coefficient of variation<\/td><td>0.92<\/td><td>0.83<\/td><td>0.82<\/td><td>1.00<\/td><td>1.05<\/td><td>1.35<\/td><td>1.30<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Moreover, for <strong>entries that are very verbose<\/strong>, has <strong>performance demand on the SIEM side is also important<\/strong> during the different calculations because of a <strong>too large number of logs<\/strong>. It is then necessary to <strong>reduce the learning period<\/strong> of the model, thus <strong>impacting the reliability of the calculated thresholds<\/strong>, because <strong>the longer the learning period<\/strong>, <strong>the more data it allows to store<\/strong> and therefore to <strong>predict better thresholds<\/strong>.<\/p>\n\n\n\n<p>Finally, it is <strong>very difficult with this solution to apply this model to a set of hosts<\/strong>. <strong>Each input emits logs in its own way<\/strong> and it is therefore <strong>mandatory to adjust the calculations for each input for this model to work correctly<\/strong>. This case-by-case adjustment can be a <strong>considerable workload if several hundred or even thousands of hosts need to be monitored<\/strong>.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Another more classical and cognitive approach<\/h1>\n\n\n\n<p>Observing that the cognitive solution can detect threshold violations much more precisely and at more plausible values, it is <strong>no less restrictive<\/strong>. Indeed, this solution requires a <strong>certain regularity in the data<\/strong>, <strong>a long learning period and thus a significant computing power<\/strong> and <strong>the ability to refine the calculations on a case by case basis<\/strong>.<\/p>\n\n\n\n<p>To overcome these different constraints, <strong>another approach<\/strong>, <strong>more classical<\/strong> and based on the <strong>idea of a cognitive solution<\/strong>, was thought and designed for a general application on a set of hosts.<\/p>\n\n\n\n<p>It consists first of all in relying on the <strong>counting of events<\/strong> rather than on the calculation of the time difference between each event. This change of parameter is very important because even if the type of data is not the same, <strong>the computational power required is much less important<\/strong> and thus allows <strong>a longer learning period<\/strong>.<\/p>\n\n\n\n<p>This model then performs <strong>statistics<\/strong> to apply a minimum threshold for each host based on their <strong>verbosity level over several time slots<\/strong>. <strong>Coefficients<\/strong> are then applied to these thresholds based on <strong>the variation in values<\/strong> that may have been measured in the past in order <strong>to refine and obtain a specific threshold for each host at a specific time<\/strong>. Although this way of calculating thresholds can be considered <strong>more arbitrary<\/strong>, it is <strong>no less accurate<\/strong> than the machine learning method. In addition, it allows you <strong>to keep control of the log loss tolerance<\/strong> and <strong>to refine the thresholds on a case-by-case basis for a set of hosts<\/strong>.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">The advantages and disadvantages<\/h1>\n\n\n\n<p>All current systems generate event logs, <strong>the volume of which varies over time<\/strong> (notably according to their activity) which creates a certain <strong>variability<\/strong>. As a result, there is <strong>no completely reliable method<\/strong> of detecting log loss. Regardless of the nature of this variance, many <strong>external factors<\/strong> can occur that can <strong>severely affect the reliability<\/strong> of the method used. Log losses are often the result of external events, such as <strong>collection agent or transmission API malfunction<\/strong>, <strong>machine decommissioning or reboots<\/strong>, which may be due to infrastructure, system or software constraints that temporarily make log collection impossible.<\/p>\n\n\n\n<p>Even if machine learning is in the news a lot at the moment because important progress has been made in this field and it could have been a good axis of improvement to answer this problem. The way it is presented often leads us to believe that it is <strong>capable of answering any problem as long as a context has been well defined<\/strong> and there is <strong>the presence of data<\/strong>. But this is obviously not the case. Although machine learning allows to <strong>increase detection rates<\/strong>, <strong>to detect attacks as early as possible<\/strong> and <strong>to improve the ability to adapt to changes<\/strong>, <strong>machines are constantly learning<\/strong>.<\/p>\n\n\n\n<p>In most cases, machine learning is <strong>a clever combination of technology and human intervention<\/strong>. For this reason, <strong>the more traditional approach better fits the context of this use case<\/strong>. Indeed, whether with MLTK or another machine learning solution, it is <strong>difficult to predict the data<\/strong> and to obtain <strong>acceptable confidence thresholds for each host<\/strong> because of the <strong>large variability<\/strong> that remains between them.<\/p>","protected":false},"excerpt":{"rendered":"<p>For SOC analysts, it is very important to know when a loss of logs is [\u2026]<\/p>","protected":false},"author":36,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[19],"tags":[],"class_list":["post-222153","post","type-post","status-publish","format-standard","hentry","category-soc-securite-operationnelle"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.0 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Log loss detection and machine learning: a possible use case with AI? - INTRINSEC<\/title>\n<meta name=\"description\" content=\"Artificial intelligence is seen as a very beneficial advance to our society, allowing us to predict our needs and thus respond with anticipation. Its ability to understand and analyze a given context can help detect anomalies or unusual behaviors and thus, can it strengthen the detection for the case of lost logs on hosts?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intrinsec.com\/en\/log-loss-machine-learning\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Log loss detection and machine learning: a possible use case with AI?\" \/>\n<meta property=\"og:description\" content=\"Artificial intelligence is seen as a very beneficial advance to our society, allowing us to predict our needs and thus respond with anticipation. Its ability to understand and analyze a given context can help detect anomalies or unusual behaviors and thus, can it strengthen the detection for the case of lost logs on hosts?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intrinsec.com\/en\/log-loss-machine-learning\/\" \/>\n<meta property=\"og:site_name\" content=\"INTRINSEC\" \/>\n<meta property=\"article:published_time\" content=\"2021-05-12T09:55:15+00:00\" \/>\n<meta name=\"author\" content=\"Tristan Pigeon\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tristan Pigeon\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/log-loss-machine-learning\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/log-loss-machine-learning\\\/\"},\"author\":{\"name\":\"Tristan Pigeon\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#\\\/schema\\\/person\\\/f40051481d9f9edccc9bf8ac004ca187\"},\"headline\":\"Log loss detection and machine learning: a possible use case with AI?\",\"datePublished\":\"2021-05-12T09:55:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/log-loss-machine-learning\\\/\"},\"wordCount\":1780,\"image\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/log-loss-machine-learning\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.intrinsec.com\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/1-1.png\",\"articleSection\":[\"SOC S\u00e9curit\u00e9 Op\u00e9rationnelle\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/log-loss-machine-learning\\\/\",\"url\":\"https:\\\/\\\/www.intrinsec.com\\\/log-loss-machine-learning\\\/\",\"name\":\"Log loss detection and machine learning: a possible use case with AI? - INTRINSEC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/log-loss-machine-learning\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/log-loss-machine-learning\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.intrinsec.com\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/1-1.png\",\"datePublished\":\"2021-05-12T09:55:15+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#\\\/schema\\\/person\\\/f40051481d9f9edccc9bf8ac004ca187\"},\"description\":\"Artificial intelligence is seen as a very beneficial advance to our society, allowing us to predict our needs and thus respond with anticipation. Its ability to understand and analyze a given context can help detect anomalies or unusual behaviors and thus, can it strengthen the detection for the case of lost logs on hosts?\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/log-loss-machine-learning\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.intrinsec.com\\\/log-loss-machine-learning\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/log-loss-machine-learning\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.intrinsec.com\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/1-1.png\",\"contentUrl\":\"https:\\\/\\\/www.intrinsec.com\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/1-1.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/log-loss-machine-learning\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.intrinsec.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Log loss detection and machine learning: a possible use case with AI?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#website\",\"url\":\"https:\\\/\\\/www.intrinsec.com\\\/\",\"name\":\"INTRINSEC\",\"description\":\"Notre m\u00e9tier , Prot\u00e9ger le v\u00f4tre\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.intrinsec.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#\\\/schema\\\/person\\\/f40051481d9f9edccc9bf8ac004ca187\",\"name\":\"Tristan Pigeon\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/?s=96&d=retro&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/?s=96&d=retro&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/?s=96&d=retro&r=g\",\"caption\":\"Tristan Pigeon\"},\"url\":\"https:\\\/\\\/www.intrinsec.com\\\/en\\\/author\\\/tristan-pigeon\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Log loss detection and machine learning: a possible use case with AI? - INTRINSEC","description":"Artificial intelligence is seen as a very beneficial advance to our society, allowing us to predict our needs and thus respond with anticipation. Its ability to understand and analyze a given context can help detect anomalies or unusual behaviors and thus, can it strengthen the detection for the case of lost logs on hosts?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intrinsec.com\/en\/log-loss-machine-learning\/","og_locale":"en_US","og_type":"article","og_title":"Log loss detection and machine learning: a possible use case with AI?","og_description":"Artificial intelligence is seen as a very beneficial advance to our society, allowing us to predict our needs and thus respond with anticipation. Its ability to understand and analyze a given context can help detect anomalies or unusual behaviors and thus, can it strengthen the detection for the case of lost logs on hosts?","og_url":"https:\/\/www.intrinsec.com\/en\/log-loss-machine-learning\/","og_site_name":"INTRINSEC","article_published_time":"2021-05-12T09:55:15+00:00","author":"Tristan Pigeon","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Tristan Pigeon","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.intrinsec.com\/log-loss-machine-learning\/#article","isPartOf":{"@id":"https:\/\/www.intrinsec.com\/log-loss-machine-learning\/"},"author":{"name":"Tristan Pigeon","@id":"https:\/\/www.intrinsec.com\/#\/schema\/person\/f40051481d9f9edccc9bf8ac004ca187"},"headline":"Log loss detection and machine learning: a possible use case with AI?","datePublished":"2021-05-12T09:55:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intrinsec.com\/log-loss-machine-learning\/"},"wordCount":1780,"image":{"@id":"https:\/\/www.intrinsec.com\/log-loss-machine-learning\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2021\/05\/1-1.png","articleSection":["SOC S\u00e9curit\u00e9 Op\u00e9rationnelle"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.intrinsec.com\/log-loss-machine-learning\/","url":"https:\/\/www.intrinsec.com\/log-loss-machine-learning\/","name":"Log loss detection and machine learning: a possible use case with AI? - INTRINSEC","isPartOf":{"@id":"https:\/\/www.intrinsec.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intrinsec.com\/log-loss-machine-learning\/#primaryimage"},"image":{"@id":"https:\/\/www.intrinsec.com\/log-loss-machine-learning\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2021\/05\/1-1.png","datePublished":"2021-05-12T09:55:15+00:00","author":{"@id":"https:\/\/www.intrinsec.com\/#\/schema\/person\/f40051481d9f9edccc9bf8ac004ca187"},"description":"Artificial intelligence is seen as a very beneficial advance to our society, allowing us to predict our needs and thus respond with anticipation. Its ability to understand and analyze a given context can help detect anomalies or unusual behaviors and thus, can it strengthen the detection for the case of lost logs on hosts?","breadcrumb":{"@id":"https:\/\/www.intrinsec.com\/log-loss-machine-learning\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intrinsec.com\/log-loss-machine-learning\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.intrinsec.com\/log-loss-machine-learning\/#primaryimage","url":"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2021\/05\/1-1.png","contentUrl":"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2021\/05\/1-1.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.intrinsec.com\/log-loss-machine-learning\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.intrinsec.com\/"},{"@type":"ListItem","position":2,"name":"Log loss detection and machine learning: a possible use case with AI?"}]},{"@type":"WebSite","@id":"https:\/\/www.intrinsec.com\/#website","url":"https:\/\/www.intrinsec.com\/","name":"INTRINSEC","description":"Our job is to protect yours.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intrinsec.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.intrinsec.com\/#\/schema\/person\/f40051481d9f9edccc9bf8ac004ca187","name":"Tristan Pigeon","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=retro&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=retro&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=retro&r=g","caption":"Tristan Pigeon"},"url":"https:\/\/www.intrinsec.com\/en\/author\/tristan-pigeon\/"}]}},"_links":{"self":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/posts\/222153","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/comments?post=222153"}],"version-history":[{"count":0,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/posts\/222153\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/media?parent=222153"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/categories?post=222153"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/tags?post=222153"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}