2022
DOI: 10.24251/hicss.2022.234
|View full text |Cite
|
Sign up to set email alerts
|

A2Log: Attentive Augmented Log Anomaly Detection

Abstract: Anomaly detection becomes increasingly important for the dependability and serviceability of IT services. As log lines record events during the execution of IT services, they are a primary source for diagnostics. Thereby, unsupervised methods provide a significant benefit since not all anomalies can be known at training time. Existing unsupervised methods need anomaly examples to obtain a suitable decision boundary required for the anomaly detection task. This requirement poses practical limitations. Therefore… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3
3

Relationship

2
7

Authors

Journals

citations
Cited by 14 publications
(7 citation statements)
references
References 27 publications
0
7
0
Order By: Relevance
“…The goal is to identify which kinds of anomalies are easy or hard to predict and also which methods perform well on which anomalies. In particular, we chose two deep learning approaches Deeplog [5] and A2Log [22], and three data mining approaches PCA [10], Invarant Miners [14], and Isolation Forest [13]. We evaluated all methods on four different train/test splits of 0.2/0.…”
Section: Evaluation Of Unsupervised Learning Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…The goal is to identify which kinds of anomalies are easy or hard to predict and also which methods perform well on which anomalies. In particular, we chose two deep learning approaches Deeplog [5] and A2Log [22], and three data mining approaches PCA [10], Invarant Miners [14], and Isolation Forest [13]. We evaluated all methods on four different train/test splits of 0.2/0.…”
Section: Evaluation Of Unsupervised Learning Methodsmentioning
confidence: 99%
“…It uses templates [8], performs anomaly detection per log message, and constructs system execution workflow models for diagnosis purposes. A2Log [22] utilizes a self-attention neural network to obtain anomaly scores for log messages and then performs anomaly detection via a decision boundary that was set based on data augmentation of available normal training data.…”
Section: Related Workmentioning
confidence: 99%
“…Another way to classify anomaly detection is to divide it into supervised and unsupervised learning. To solve the issue of lack of labeled log data, some unsupervised log anomaly detection methods [19][20][21] have been proposed, which have two significant steps: anomaly scoring and anomaly decision. However, unsupervised learning methods do not make full use of labeling features, and the algorithms do not know the exact output in advance, so the effectiveness is doubtful.…”
Section: Related Workmentioning
confidence: 99%
“…The LAMA model is applied for anomaly detection, where our model is applied for failure prediction. [77] also employed the transformer-encoder architecture to develop an unsupervised anomaly detection technique called A2Log. There are other recent research studies that utilized the self-attention with different transformer variants for error and anomaly detection such as LAnoBERT [49], LogAttention [25], and [48].…”
Section: Related Workmentioning
confidence: 99%