Anomaly Detection in Security Logs

A modular machine learning suite for detecting anomalies across varied security log types.

Project Summary

This project explores various techniques for identifying anomalous behavior in system, network, and endpoint security logs. The suite includes multiple Jupyter notebooks each focusing on different detection methods (e.g. statistical outlier models, clustering, autoencoders), log types (EDR, DNS, proxy, authentication), and feature engineering pipelines.

Highlights

Notebooks

Notebook 1: Anomaly Detection in Proxy Logs

Applies DBSCAN and isolation forests to detect suspicious outbound connections.

View Notebook →

Notebook 2: DNS Behavior Modeling

Uses time-series embeddings and window-based anomaly scoring on DNS resolution patterns.

View Notebook →

Example Visualizations

Below are selected results from the notebooks:

EDR Cluster Example DNS Timeline

Key Takeaways

← Back to Projects