Security Log Analysis with Explainable Machine Learning

dc.contributor.authorAronsson, Linus
dc.contributor.authorBengtsson, Aron
dc.contributor.departmentChalmers tekniska högskola / Institutionen för data och informationstekniksv
dc.contributor.examinerOlovsson, Tomas
dc.contributor.supervisorAlmgren, Magnus
dc.date.accessioned2021-09-24T06:26:39Z
dc.date.available2021-09-24T06:26:39Z
dc.date.issued2021sv
dc.date.submitted2020
dc.description.abstractPhysical access control systems are implemented to restrict access in order to prevent attacks from happening in the physical space. These systems usually produce access logs that contain information to track accesses made by users. The access logs can however end up becoming large and difficult to interpret, making security assessment impractical for administrators and as a consequence, the logs are rarely inspected. The current method of detecting anomalies by manual inspection is often not a feasible approach in preventing attacks. For this reason, anomaly detection using machine learning is a method that can aid administrators in detecting attacks and being able to proactively prevent them from happening again. In this thesis, we first analyze users from a dataset of physical access logs and cluster them into groups with similar behavior based on their access pattern. Next, we train two LSTM autoencoder models for each cluster in order to detect anomalies of two different access sequence lengths. Finally, we evaluate the model with the help of a security expert from the industry by reviewing explanations produced using SHAP values. The results in this thesis show that our method was able to reduce the number of log events that need to be manually inspected by 95.6% in the given dataset. The results also show that the explanations provided by SHAP values was able to help in understanding what caused an anomaly. In conclusion, our proposed method is advantageous compared to manual inspection as it greatly reduces the amount of work required to detect anomalies, and the SHAP values are able to help security administrators to work in a more proactive manner.sv
dc.identifier.coursecodeDATX05sv
dc.identifier.urihttps://hdl.handle.net/20.500.12380/304195
dc.language.isoengsv
dc.setspec.uppsokTechnology
dc.subjectsecuritysv
dc.subjectphysical access controlsv
dc.subjectanomaly detectionsv
dc.subjectmachine learningsv
dc.subjectdeep learningsv
dc.subjectLSTM autoencodersv
dc.subjectexplainabilitysv
dc.subjectSHAPsv
dc.titleSecurity Log Analysis with Explainable Machine Learningsv
dc.type.degreeExamensarbete för masterexamensv
dc.type.uppsokH
Ladda ner
Original bundle
Visar 1 - 1 av 1
Hämtar...
Bild (thumbnail)
Namn:
CSE 21-128 Aronsson Bengtsson.pdf
Storlek:
6.5 MB
Format:
Adobe Portable Document Format
Beskrivning:
License bundle
Visar 1 - 1 av 1
Hämtar...
Bild (thumbnail)
Namn:
license.txt
Storlek:
1.51 KB
Format:
Item-specific license agreed upon to submission
Beskrivning: