# anomaly-detection
9 articlestagged with “anomaly-detection”
Inference Log Analysis
Analyzing inference logs for AI forensic investigation: detecting anomalous patterns, identifying jailbreak attempts through metadata, token-level analysis, and latency anomaly detection.
Monitoring & Detection Assessment
Test your understanding of AI security monitoring, anomaly detection, logging strategies, and incident detection for LLM-based applications with 9 intermediate-level questions.
LLM Monitoring and Anomaly Detection
Building monitoring systems that detect adversarial usage patterns in LLM applications.
AI Anomaly Detection
Detecting jailbreak attempts, unusual usage patterns, output drift, and embedding space anomalies in AI systems through statistical and ML-based methods.
Runtime Monitoring & Anomaly Detection
Monitoring LLM applications in production for token usage anomalies, output pattern detection, behavioral drift, and using tools like Langfuse, Helicone, and custom logging.
Token-Level Anomaly Detection
Building token-level anomaly detection systems that identify adversarial patterns in input sequences.
Continuous Monitoring of Fine-Tuned Models
Post-deployment monitoring strategies for fine-tuned models -- drift detection, behavior baselines, automated re-evaluation, and anomaly detection to catch safety issues that pre-deployment testing missed.
AI Monitoring Setup
Step-by-step walkthrough for implementing AI system monitoring: inference logging, behavioral anomaly detection, alert configuration, dashboard creation, and integration with existing SIEM platforms.
Anomaly Detection for LLM Traffic
Build anomaly detection for LLM API traffic to identify attack patterns, abuse, and prompt injection attempts.