Content area

Abstract

This framework presents an innovative methodology that combines LSTM, Transformer, and GNN models to effectively capture both temporal and spatial patterns within log data, thus improving cybersecurity anomaly detection and forensic analysis. By utilizing LSTM networks, the system is able to model sequential log patterns over time, which aids in identifying hidden attack behaviors. Transformer architectures are employed to examine contextual relationships within logs, allowing for accurate, context-sensitive classification. Moreover, Graph Neural Networks (GNNs) depict logs as interconnected graphs, which facilitates the identification of coordinated multi-stage attacks from various sources. The integration of these models enables a thorough analysis of log data, simultaneously capturing dynamic temporal sequences and intricate relationships. The system autonomously correlates logs from system, network, and application sources to reconstruct attack timelines and identify emerging threats in real time. Empirical assessments on datasets such as HDFS, CICIDS, and UNSW-NB15 indicate that this integrated approach outperforms traditional methods, achieving detection accuracies of up to 98.2%, minimizing false positives, and expediting forensic investigations—thereby significantly enhancing the capabilities of automated cybersecurity monitoring and response.

Details

1009240
Business indexing term
Title
Advanced system log analyzer for anomaly detection and cyber forensic investigations using LSTM and transformer networks
Author
Chourasiya, Leeladhar 1 ; Khatri, Sushma 1 ; Lilhore, Umesh Kumar 2 ; Simaiya, Sarita 3 ; Alroobaea, Roobaea 4 ; Baqasah, Abdullah M. 5 ; Alsafyani, Majed 4 ; Khan, Monish 6 

 Department Computer Science and Engineering, Indore, India 
 Galgotias University, School of Computing Science and Engineering, Department of Computer Science and Engineering, Greater Noida, India (GRID:grid.448824.6) (ISNI:0000 0004 1786 549X) 
 Galgotias University, School of Computer Applications & Technology, Greater Noida, India (GRID:grid.448824.6) (ISNI:0000 0004 1786 549X) 
 Taif University, P. O. Box 11099, 21944, Department of Computer Science, College of Computers and Information Technology, Taif, Saudi Arabia (GRID:grid.412895.3) (ISNI:0000 0004 0419 5255) 
 Taif University, P. O. Box 11099, 21974, Department of Information Technology, College of Computers and Information Technology, Taif, Saudi Arabia (GRID:grid.412895.3) (ISNI:0000 0004 0419 5255) 
 Arba Minch University, Arba Minch, Ethiopia (GRID:grid.442844.a) (ISNI:0000 0000 9126 7261) 
Publication title
Volume
14
Issue
1
Pages
60
Publication year
2025
Publication date
Dec 2025
Publisher
Springer Nature B.V.
Place of publication
Heidelberg
Country of publication
Netherlands
Publication subject
e-ISSN
2192113X
Source type
Scholarly Journal
Language of publication
English
Document type
Journal Article
Publication history
 
 
Online publication date
2025-10-28
Milestone dates
2025-09-29 (Registration); 2025-06-05 (Received); 2025-09-29 (Accepted)
Publication history
 
 
   First posting date
28 Oct 2025
ProQuest document ID
3266181247
Document URL
https://www.proquest.com/scholarly-journals/advanced-system-log-analyzer-anomaly-detection/docview/3266181247/se-2?accountid=208611
Copyright
© The Author(s) 2025. This work is published under http://creativecommons.org/licenses/by-nc-nd/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Last updated
2025-10-29
Database
ProQuest One Academic