cover

PatternIQ Mining (PIQM)

Published by Sahara Digital Publication  •  eISSN: 3006-8894

Bald Eagle Search-Based Pattern Mining Model for Detecting Anomalies in Cyber Security Logs

Volume 2, Issue 3 2026
Original Research

Mehdi Esfahani and Hossein Ghasemi

Published: 2025-12-19
36 Views 13 Downloads

Abstract

The increasing frequency of cyberattacks has made anomaly detection in cybersecurity logs a vital area of research. Pattern mining models are commonly used to uncover suspicious behavior hidden within massive log data. However, existing anomaly detection methods often suffer from issues such as low detection accuracy, high false alarm rates, and poor optimization of pattern relevance. To address these challenges, this paper proposes a novel Bald Eagle Search Optimized Pattern Mining (BES-OPM) framework. Inspired by the intelligent foraging behavior of bald eagles, the BES algorithm is utilized to optimize the pattern mining process by enhancing feature selection and reducing noise, enabling efficient identification of significant log patterns. The BES-OPM model extracts frequent and rare patterns from system logs and detects deviations that indicate potential security breaches. This approach is efficient for identifying complex threats such as insider attacks and advanced persistent threats. Experimental results show that the proposed method outperforms existing techniques in terms of accuracy (85 %) and Detection (21%). The findings demonstrate the potential of BES-OPM as a robust and intelligent model for anomaly detection in cybersecurity systems.

Keywords :

Anomaly Detection, Bald Eagle Search, Pattern Mining, Cybersecurity Logs, Optimization Algorithm, Insider Threats.

Download Full Text (PDF)