Anomaly detection in Network Logs using Generalized Isolation Forest and ExIFFI
Karan Alang

TL;DR

Anomaly detection in network logs is critical as cyber threats become increasingly sophisticated. The session presented a hybrid machine learning approach combining the Isolation Forest algorithm with ExIFFI to enhance detection and interpretability. This solution improves real-time detection accuracy and provides explainable results, making it suitable for modern cybersecurity needs.

Opening

In an era where every network can potentially be under attack due to the rapid adoption of cloud computing and IoT, traditional security measures often fall short. Modern threats such as Advanced Persistent Threats (APTs) and polymorphic malware can bypass conventional defense mechanisms, necessitating real-time monitoring and intelligent anomaly detection. This session highlights a cutting-edge approach to anomaly detection, addressing the urgent need for advanced solutions in cybersecurity.

What You'll Learn (Key Takeaways)

  • Isolation Forest Efficiency – Learn how the Generalized Isolation Forest model efficiently detects rare and subtle anomalies in high-dimensional network log data.
  • Enhanced Interpretability with ExIFFI – Discover how ExIFFI provides transparency by explaining why specific logs are flagged as anomalous, aiding in root cause analysis.
  • Real-world Implementation – Gain insights into implementing this solution in real-time environments using tools like Apache Spark, Apache Kafka, and visualization platforms such as Prometheus/Grafana.
  • Benchmarking and Hyperparameter Tuning – Understand the importance of tuning hyperparameters and the lessons learned from handling noisy log data.

Q&A Highlights

Q: Can the system be trained in real-time to adapt to changing attack vectors?
A: The current model is trained on batch datasets every five days, but real-time adaptability is challenging due to constantly evolving cyber threats. Other solutions like threat protection systems complement this approach by continuously monitoring network traffic.

Q: Is it possible to integrate attack vector fingerprints into the model?
A: While anomaly detection focuses on identifying deviations in data, incorporating attack vector fingerprints is more aligned with frameworks like MITRE ATT&CK, which provides detailed insights into potential attack strategies.

Q: How does the model perform in terms of execution time compared to other approaches?
A: The proposed EGIF model performs well, with an execution time of 2.1 seconds, significantly faster than computationally intensive models like 1D CNN, which takes 12.4 seconds.

This structured approach provides actionable insights for data streaming practitioners, emphasizing the technical advancements and practical applications of the discussed anomaly detection model.

Karan Alang
Principal Software Engineer, Versa Networks Inc

With 25 years of experience in software engineering, I am a Principal Software Engineer, Tech Lead, and Architect, specializing in distributed systems, big data, cloud computing, and AI/ML. Currently, I lead the Data Engineering team at Versa Networks Inc., where we build scalable distributed systems and data pipelines, while supporting and driving ML/AI initiatives in networking and security.

Over my career, I’ve worked with companies like Apple, i2 Technologies, Lenovo, 3M, and US Steel, designing and optimizing large-scale data architectures.

My technical expertise includes Python, Java, Scala, Apache Spark, Kafka, Kubernetes, GCP, AWS, Airflow, and Terraform with a strong focus on big data, real-time analytics, AI-powered automation, and cloud-native solutions.

Beyond technology, I am passionate about leading high-impact teams, mentoring engineers, and collaborating with stakeholders to drive innovation. At AI Dev Summit, I look forward to sharing insights on scaling AI in production, leveraging big data for ML, and architecting resilient cloud-native AI systems.

Newsletter

Our strategies and tactics delivered right to your inbox

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.