Bibliography
[15] Min Du, Feifei Li, Guineng Zheng, and Vivek Srikumar. Deeplog: Anomaly
detection and diagnosis from system logs through deep learning. In Proceed-
ings of the 2017 ACM SIGSAC Conference on Computer and Communications
Security, pages 1285–1298, 2017.
[16] Wen Kai Guo Fan. An adaptive anomaly detection of web-based attacks.
In 2012 7th International Conference on Computer Science & Education
(ICCSE), pages 690–694. IEEE, 2012.
[17] Pedro F Felzenszwalb and Daniel P Huttenlocher. Efficient graph-based
image segmentation. International journal of computer vision, 59(2):167–
181, 2004.
[18] Roy Fielding, Jim Gettys, Jeffrey Mogul, Henrik Frystyk, Larry Masinter,
Paul Leach, and Tim Berners-Lee. Hypertext transfer protocol–http/1.1,
1999.
[19] Pedro Garcia-Teodoro, Jesus Diaz-Verdejo, Gabriel Maciá-Fernández, and
Enrique Vázquez. Anomaly-based network intrusion detection: Techniques,
systems and challenges. computers & security, 28(1-2):18–28, 2009.
[20] Felix A Gers, Jürgen Schmidhuber, and Fred Cummins. Learning to forget:
Continual prediction with lstm. 1999.
[21] Carmen Torrano Giménez, Alejandro Pérez Villegas, and Gonzalo álvarez
Mara?ón. Http data set csic 2010. Information Security Institute of CSIC
(Spanish Research National Council), 2010.
[22] Ian Goodfellow, Yoshua Bengio, and Aaron Courville. 6.5 back-propagation
and other differentiation algorithms. Deep Learning, pages 200–220, 2016.
[23] Alex Graves, Marcus Liwicki, Santiago Fernández, Roman Bertolami, Horst
Bunke, and Jürgen Schmidhuber. A novel connectionist system for uncon-
strained handwriting recognition. IEEE transactions on pattern analysis
and machine intelligence, 31(5):855–868, 2008.
[24] Roger Grosse. Lecture 15: Exploding and vanishing gradients. University of
Toronto Computer Science, 2017.
[25] Mark Hall, Eibe Frank, Geoffrey Holmes, Bernhard Pfahringer, Peter Reute-
mann, and Ian H Witten. The weka data mining software: an update. ACM
SIGKDD explorations newsletter, 11(1):10–18, 2009.
[26] Sepp Hochreiter and Jürgen Schmidhuber. Long short-term memory. Neural
computation, 9(8):1735–1780, 1997.
[27] Dotan Horovits. A practical guide to kubernetes logging, Sep 2020. URL:
[28] Ahmad Javaid, Quamar Niyaz, Weiqing Sun, and Mansoor Alam. A deep
learning approach for network intrusion detection system. In Proceedings
of the 9th EAI International Conference on Bio-inspired Information and
Communications Technologies (formerly BIONETICS), pages 21–26, 2016.
[29] Hanif Jetha. How to set up an elasticsearch, fluentd and kibana (efk) logging
53