You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/en/stack/ml/anomaly-detection/anomaly-how-tos.asciidoc
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,16 +28,16 @@ The guides in this section describe some best practices for generating useful
28
28
The blog posts listed below show how to get the most out of Elastic {ml}
29
29
{anomaly-detect}.
30
30
31
-
* https://www.elastic.co/blog/sizing-machine-learning-with-elasticsearch[Sizing for {ml} with {es}]
32
-
* https://www.elastic.co/blog/filtering-input-data-to-refine-machine-learning-jobs[Filtering input data to refine {ml-jobs}]
33
-
* https://www.elastic.co/blog/temporal-vs-population-analysis-in-elastic-machine-learning[Temporal vs. population analysis in Elastic {ml}]
34
-
* https://www.elastic.co/blog/using-elasticsearch-and-machine-learning-for-it-operations[Using {es} and {ml} for IT Operations]
35
-
* https://www.elastic.co/blog/using-machine-learning-and-elasticsearch-for-security-analytics-deep-dive[Using {ml} and {es} for security analytics]
36
-
* https://www.elastic.co/blog/augmenting-results-with-user-annotations-for-elastic-machine-learning[User annotations for Elastic {ml}]
37
-
* https://www.elastic.co/blog/custom-elasticsearch-aggregations-for-machine-learning-jobs[Custom {es} aggregations for {ml-jobs}]
38
-
* https://www.elastic.co/blog/analysing-linux-auditd-anomalies-with-auditbeat-and-elastic-stack-machine-learning[Analysing Linux auditd anomalies with Auditbeat and {ml}]
39
-
* https://www.elastic.co/blog/how-to-optimize-elasticsearch-machine-learning-job-configurations-using-job-validation[How to optimize {es} {ml} job configurations using job validation]
40
-
* https://www.elastic.co/blog/interpretability-in-ml-identifying-anomalies-influencers-root-causes[Interpretability in {ml}: Identifying anomalies, influencers, and root causes]
31
+
* {blog-ref}sizing-machine-learning-with-elasticsearch[Sizing for {ml} with {es}]
32
+
* {blog-ref}filtering-input-data-to-refine-machine-learning-jobs[Filtering input data to refine {ml-jobs}]
33
+
* {blog-ref}temporal-vs-population-analysis-in-elastic-machine-learning[Temporal vs. population analysis in Elastic {ml}]
34
+
* {blog-ref}using-elasticsearch-and-machine-learning-for-it-operations[Using {es} and {ml} for IT Operations]
35
+
* {blog-ref}using-machine-learning-and-elasticsearch-for-security-analytics-deep-dive[Using {ml} and {es} for security analytics]
36
+
* {blog-ref}augmenting-results-with-user-annotations-for-elastic-machine-learning[User annotations for Elastic {ml}]
37
+
* {blog-ref}custom-elasticsearch-aggregations-for-machine-learning-jobs[Custom {es} aggregations for {ml-jobs}]
38
+
* {blog-ref}analysing-linux-auditd-anomalies-with-auditbeat-and-elastic-stack-machine-learning[Analysing Linux auditd anomalies with Auditbeat and {ml}]
39
+
* {blog-ref}how-to-optimize-elasticsearch-machine-learning-job-configurations-using-job-validation[How to optimize {es} {ml} job configurations using job validation]
40
+
* {blog-ref}interpretability-in-ml-identifying-anomalies-influencers-root-causes[Interpretability in {ml}: Identifying anomalies, influencers, and root causes]
41
41
42
42
There are also some examples in the {ml} folder in the https://github.com/elastic/examples[examples repository].
Copy file name to clipboardExpand all lines: docs/en/stack/ml/df-analytics/ml-dfa-classification.asciidoc
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1048,8 +1048,8 @@ destination indices and {data-sources}.
1048
1048
=== Further readings
1049
1049
1050
1050
* https://github.com/elastic/examples/tree/master/Machine%20Learning/Analytics%20Jupyter%20Notebooks[{classanalysis-cap} example (Jupyter notebook)]
1051
-
* https://www.elastic.co/blog/benchmarking-binary-classification-results-in-elastic-machine-learning[Benchmarking binary {classification} results in Elastic {ml}]
1052
-
* https://www.elastic.co/blog/using-elastic-supervised-machine-learning-for-binary-classification[Using Elastic supervised {ml} for binary {classification}]
1053
-
* https://www.elastic.co/blog/machine-learning-in-cybersecurity-training-supervised-models-to-detect-dga-activity[{ml-cap} in cybersecurity – part 1: Training supervised models to detect DGA activity]
1054
-
* https://www.elastic.co/blog/machine-learning-in-cybersecurity-detecting-dga-activity-in-network-data[{ml-cap} in cybersecurity – part 2: Detecting DGA activity in network data]
1055
-
* https://www.elastic.co/blog/supervised-and-unsupervised-machine-learning-for-dga-detection[Combining supervised and unsupervised machine learning for DGA detection]
1051
+
* {blog-ref}benchmarking-binary-classification-results-in-elastic-machine-learning[Benchmarking binary {classification} results in Elastic {ml}]
1052
+
* {blog-ref}using-elastic-supervised-machine-learning-for-binary-classification[Using Elastic supervised {ml} for binary {classification}]
1053
+
* {blog-ref}machine-learning-in-cybersecurity-training-supervised-models-to-detect-dga-activity[{ml-cap} in cybersecurity – part 1: Training supervised models to detect DGA activity]
1054
+
* {blog-ref}machine-learning-in-cybersecurity-detecting-dga-activity-in-network-data[{ml-cap} in cybersecurity – part 2: Detecting DGA activity in network data]
1055
+
* {blog-ref}supervised-and-unsupervised-machine-learning-for-dga-detection[Combining supervised and unsupervised machine learning for DGA detection]
Copy file name to clipboardExpand all lines: docs/en/stack/ml/df-analytics/ml-dfa-overview.asciidoc
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -83,7 +83,7 @@ like {anomaly-detect} or {oldetection} – does not have this requirement.
83
83
* {regression}: predicts **continuous, numerical values** like the response time
84
84
of a web request.
85
85
* {classification}: predicts **discrete, categorical values** like whether a
86
-
https://www.elastic.co/blog/machine-learning-in-cybersecurity-training-supervised-models-to-detect-dga-activity[DNS request originates from a malicious or benign domain].
86
+
{blog-ref}machine-learning-in-cybersecurity-training-supervised-models-to-detect-dga-activity[DNS request originates from a malicious or benign domain].
87
87
88
88
89
89
[discrete]
@@ -181,4 +181,4 @@ the model is used to infer against the data and make predictions on it.
Copy file name to clipboardExpand all lines: docs/en/stack/ml/df-analytics/ml-feature-importance.asciidoc
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -70,5 +70,5 @@ prediction.
70
70
* {feat-imp-cap} in the {stack} is calculated using the SHAP (SHapley Additive
71
71
exPlanations) method as described in
72
72
https://papers.nips.cc/paper/7062-a-unified-approach-to-interpreting-model-predictions.pdf[Lundberg, S. M., & Lee, S.-I. A Unified Approach to Interpreting Model Predictions. In NeurIPS 2017].
73
-
* https://www.elastic.co/blog/feature-importance-for-data-frame-analytics-with-elastic-machine-learning[{feat-imp-cap} for {dfanalytics} with Elastic {ml}].
73
+
* {blog-ref}feature-importance-for-data-frame-analytics-with-elastic-machine-learning[{feat-imp-cap} for {dfanalytics} with Elastic {ml}].
74
74
* https://github.com/elastic/examples/tree/master/Machine%20Learning/Feature%20Importance[Feature importance for {dfanalytics} (Jupyter notebook)].
0 commit comments