
Prabhat Pokharel- Master of Computer Information System
- NCIT
Prabhat Pokharel
- Master of Computer Information System
- NCIT
About
7
Publications
9,604
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
154
Citations
Introduction
Industry professional with an active interest in research.
Areas of interest:
Software Product Management,
Cybersecurity,
Agile Methodologies,
Design Thinking,
Data Science,
Machine Learning.
Current institution
Additional affiliations
July 2017 - present
LogPoint
Position
- Business Development Manager
Education
February 2016 - September 2018
Publications
Publications (7)
The focus of agile methodology is on customer satisfaction through the early and continuous delivery of valuable software. In agile, requirements are represented in the form of user stories. And the user stories are represented from the user’s point of view. The user stories are effective only when the software practitioners are aware of the user s...
This paper presents a user intrusion detection system based on hybrid classifier and profile enhancement techniques. The proposed approach is an anomaly-based intrusion detection system that uses supervised learning based on event logs from the Windows operating system. A standard user profile is first built on the historical log data. This user pr...
Identifying anomalies from log data for insider threat detection is practically a very challenging task for security analysts. User behavior modeling is very important for the identification of these anomalies. This paper presents unsupervised user behavior modeling for anomaly detection. The proposed approach uses LSTM based Autoencoder to model u...
Pattern recognition is very important for the identification of anomalous patterns in log messages. This paper presents pattern recognition in time series log data for anomaly detection. The proposed method uses Seasonal Auto Regression Integrated Moving Average (Seasonal ARIMA) to identify deviations between actual and predicted values. The deviat...
Analysis of log message is very important for the identification of a suspicious system and network activity. This analysis requires the correct extraction of variable entities. The variable entities are extracted by comparing the logs messages against the log patterns. Each of these log patterns can be represented in the form of a log signature. I...
Intrusion Detection System (IDS) is a form of defense that aims to detect suspicious activities and attack against information systems in general. With new types of attacks appearing continuously, developing adaptive and flexible security oriented approaches is a severe challenge. In this scenario, this thesis presents an anomaly-based intrusion de...
Extracting correct and useful information from log messages is useful for real-time analysis and detecting faults, anomalies and security threats. The semantics of the extracted information is needed for deeper analysis. Very little work has been done in the past for automated information extraction from log messages. Thus, in this research work, I...
Questions
Question (1)
I am looking to identify the following on high dimensional data.
1. Clusters
2. Outliers
I have tried different dimension reduction approaches and used the reduced dimension to plot the data to identify the patterns graphically.
I have identified the outlier data points through other approaches, but not through clustering. The data contains user activities and my objective is to find the similar group of users and anomalous data points (rows).