Preprint Article Version 1 This version is not peer-reviewed

An Intelligent Approach to Automated OS Log Analysis for Enhanced Security

Version 1 : Received: 10 October 2024 / Approved: 11 October 2024 / Online: 14 October 2024 (16:31:46 CEST)

How to cite: Johnphill, O.; Safaa Sadiq, A.; Kaiwartya, O.; Aljaidi, M. An Intelligent Approach to Automated OS Log Analysis for Enhanced Security. Preprints 2024, 2024100951. https://doi.org/10.20944/preprints202410.0951.v1 Johnphill, O.; Safaa Sadiq, A.; Kaiwartya, O.; Aljaidi, M. An Intelligent Approach to Automated OS Log Analysis for Enhanced Security. Preprints 2024, 2024100951. https://doi.org/10.20944/preprints202410.0951.v1

Abstract

Self-healing systems have become essential in modern computing for ensuring continuous and secure operations while minimising downtime and maintenance costs. These systems autonomously detect, diagnose, and correct anomalies, with effective self-healing relying on accurate interpretation of system logs generated by operating systems (OS). Manual analysis of these logs in complex environments is often cumbersome, time-consuming, and error-prone, highlighting the need for automated, reliable log analysis methods. Our research introduces an intelligent methodology for creating self-healing systems for multiple OS, focusing on log classification using CountVectorizer and the Multinomial Naive Bayes algorithm. This approach involves preprocessing OS logs to ensure quality, converting them into a numerical format with CountVectorizer, and then classifying them using the Naive Bayes algorithm. The system classifies multiple OS logs into distinct categories, identifying errors and warnings. We tested our model on logs from four major OS; Mac, Android, Linux, and Windows; sourced from Zenodo to simulate real-world scenarios. The model's accuracy, precision, and reliability were evaluated, demonstrating its potential for deployment in practical self-healing systems.

Keywords

Multi-class system log classification; Operating system log mining; Self-healing systems; Cybersecurity; Countvectorizer; Feature selection; Artificial Intelligence

Subject

Computer Science and Mathematics, Artificial Intelligence and Machine Learning

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.