Show simple item record

dc.contributor.authorSchofield, Catherine
dc.contributor.authorJananthan, Hayden
dc.contributor.authorKepner, Jeremy
dc.date.accessioned2026-03-20T19:30:22Z
dc.date.available2026-03-20T19:30:22Z
dc.date.issued2026-03-20
dc.identifier.urihttps://hdl.handle.net/1721.1/165231
dc.description.abstractCentralized cyber logging platforms ingest large volumes of heterogeneous telemetry, yet high dimensionality and query-driven workflows often limit scalable analytic insight on these systems. This work presents an automated pipeline for ingesting, characterizing, and analyzing large-scale hostbased logs using sparse representations and distribution-aware statistics. A systematic dimensional analysis reduces hundreds of raw log fields to a small set of informative dimensions suitable for aggregation across extended time windows. Temporal analysis of the reduced representation reveals coordinated deviations in activity volume and distributional behavior that are not apparent in individual log streams. The results demonstrate that dimensional reduction enables scalable, interpretable analysis of enterprise cyber telemetry. Furthermore, these results were obtained using host-based sensors designed for event-oriented point-defense and demonstrate the feasibility of integrating such sensors to enable long-range, long-duration area defense.en_US
dc.description.sponsorshipDepartment of the Air Force Artificial Intelligence Acceleratoren_US
dc.language.isoen_USen_US
dc.subjectdefensive cyber operations, log analysis, anomaly detection, sparse matrices, enterprise networksen_US
dc.titleAI for Scalable Defensive Cyber Log Analysisen_US
dc.typeTechnical Reporten_US
dc.contributor.departmentLincoln Laboratoryen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record