Logic-Driven Cybersecurity: A Novel Framework for System Log Anomaly Detection using Answer Set Programming

📅 2025-12-04
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
To address the weak interpretability and poor adaptability of rule-based log anomaly detection under dynamic network threats, this paper proposes a declarative anomaly detection method grounded in Answer Set Programming (ASP). It models structured system logs as logical facts and encodes multi-granularity security rules—such as brute-force attacks, privilege escalation, and anomalous connections—in predicate logic to enable event correlation and automated logical inference. The approach supports flexible specification and incremental updates of complex rules, generating interpretable alerts backed by complete causal chains. Experiments on real-world Linux system logs demonstrate an accuracy exceeding 92% and a false positive rate below 3.5%, significantly outperforming conventional statistical and machine learning–based methods. This work establishes a novel paradigm for building highly trustworthy, auditable cybersecurity analysis frameworks.

Technology Category

Application Category

📝 Abstract
This study explores the application of Answer Set Programming (ASP) for detecting anomalies in system logs, addressing the challenges posed by evolving cyber threats. We propose a novel framework that leverages ASP's declarative nature and logical reasoning capabilities to encode complex security rules as logical predicates. Our ASP-based system was applied to a real-world Linux system log dataset, demonstrating its effectiveness in identifying various anomalies such as potential brute-force attacks, privilege escalations, frequent network connections from specific IPs, and various system-level issues. Key findings highlight ASP's strengths in handling structured log data, rule flexibility, and event correlation. The approach shows promise in providing explainable alerts from real-world data. This research contributes to computer forensics by demonstrating a logic-based paradigm for log analysis on a practical dataset, opening avenues for more nuanced and adaptive cyber intelligence systems.
Problem

Research questions and friction points this paper is trying to address.

Detects anomalies in system logs using Answer Set Programming
Encodes complex security rules as logical predicates for analysis
Identifies cyber threats like brute-force attacks and privilege escalations
Innovation

Methods, ideas, or system contributions that make the work stand out.

ASP encodes security rules as logical predicates
Framework leverages ASP for structured log anomaly detection
Approach provides explainable alerts from real-world system logs
🔎 Similar Papers
No similar papers found.