![]() ![]() Zhang, X., et al.: Robust log-based anomaly detection on unstable log data. In: Proceedings of the ACM SIGOPS 22nd Symposium on Operating Systems Principles, pp. Xu, W., Huang, L., Fox, A., Patterson, D., Jordan, M.I.: Detecting large-scale system problems by mining console logs. In: Advances in Neural Information Processing Systems, pp. Vaswani, A., et al.: Attention is all you need. Salton, G., Buckley, C.: Term-weighting approaches in automatic text retrieval. Meng, W., et al.: LogAnomaly: unsupervised detection of sequential and quantitative anomalies in unstructured logs. In: USENIX Annual Technical Conference, pp. Lou, J.G., Fu, Q., Yang, S., Xu, Y., Li, J.: Mining invariants from console logs for system problem detection. In: Seventh IEEE International Conference on Data Mining (ICDM 2007), pp. Liang, Y., Zhang, Y., Xiong, H., Sahoo, R.: Failure prediction in IBM BlueGene/l event logs. zip: compressing text classification models. Joulin, A., Grave, E., Bojanowski, P., Douze, M., Jégou, H., Mikolov, T.: Fasttext. He, S., Zhu, J., He, P., Lyu, M.R.: Loghub: a large collection of system log datasets towards automated log analytics. In: 2016 IEEE 27th International Symposium on Software Reliability Engineering (ISSRE), pp. He, S., Zhu, J., He, P., Lyu, M.R.: Experience report: system log analysis for anomaly detection. In: 2017 IEEE International Conference on Web Services (ICWS), pp. He, P., Zhu, J., Zheng, Z., Lyu, M.R.: Drain: an online log parsing approach with fixed depth tree. ![]() In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 1283–1297 (2019)ĭu, M., Li, F., Zheng, G., Srikumar, V.: DeepLog: anomaly detection and diagnosis from system logs through deep learning. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp. IEEE (2018)ĭu, M., Chen, Z., Liu, C., Oak, R., Song, D.: Lifelong anomaly detection through unlearning. In: 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS), pp. 111–124 (2010)ĭebnath, B., et al.: LogLens: a real-time log analysis system. In: Proceedings of the 5th European Conference on Computer Systems, pp. 1961–1964 (2020)īodik, P., Goldszmidt, M., Fox, A., Woodard, D.B., Andersen, H.: Fingerprinting the datacenter: automated classification of performance crises. In: Proceedings of the 29th ACM International Conference on Information & Knowledge Management, pp. Keywordsīaril, X., Coustié, O., Mothe, J., Teste, O.: Application performance anomaly detection with LSTM on temporal irregularities in logs. We evaluate LogAttention on two publicly available log datasets, and the experimental results demonstrate that our proposed approach can achieve better results compared to the existing baselines. LogAttention has the ability to capture contextual and semantic information in the log patterns and to attend far more long-range dependencies in the log pattern sequence. In this work, we propose a log-based automated anomaly detection approach called LogAttention, which embeds log patterns into semantic vectors and subsequently uses a self-attention based neural network to detect anomalies in the log pattern sequences. However, it’s time-consuming to check the large amount of logs manually due to the ever-increasing scale and complexity of the system. Because of the rich information provided by logs, log-based anomaly detection approaches have attracted great interest nowadays. Anomaly detection is one of the key technologies to ensure the performance and reliability of software systems.
0 Comments
Leave a Reply. |