2020 IEEE Fifth International Conference on Data Science in Cyberspace (DSC) 2020
DOI: 10.1109/dsc50466.2020.00063
|View full text |Cite
|
Sign up to set email alerts
|

An Anomaly Detection Method for System Logs Using Venn-Abers Predictors

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
2
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 14 publications
0
2
0
Order By: Relevance
“…Venn-ABERS predictors have been successfully applied in different fields, such as drug discovery (Buendia et al, 2019), compound activity prediction (Toccaceli et al, 2016), adversarial manipulation detection (Peck et al, 2020) and log anomaly detection (Pan et al, 2020). To the best of our knowledge, we are the first to apply Venn-ABERS prediction to modelling uncertainty in NLU.…”
Section: Related Workmentioning
confidence: 99%
“…Venn-ABERS predictors have been successfully applied in different fields, such as drug discovery (Buendia et al, 2019), compound activity prediction (Toccaceli et al, 2016), adversarial manipulation detection (Peck et al, 2020) and log anomaly detection (Pan et al, 2020). To the best of our knowledge, we are the first to apply Venn-ABERS prediction to modelling uncertainty in NLU.…”
Section: Related Workmentioning
confidence: 99%
“…By this way it is convenient to use the loss function to compare the effectiveness of various algorithms. The experimental results turn out that the method of using Venn-Abers predictors to evaluate the correctness of the system anomaly detection is valid and accurate [27]. Moreover, considering the differences in the data processing principles of different algorithms, full play is given to the advantages of each model, and integrated learning is used in order to achieve a stronger generalization ability.…”
Section: Introductionmentioning
confidence: 98%
“…different methods can be used for scheduling. existing algorithms can be divided into two classes, online mode and categories [2]. in the online mode, a task is assigned to the appropriate resource or machine (in terms of timing and strategy) as soon as the grid scheduler is reached; but in the case of batch tasks, they are not scheduled immediately, but become a group (set of tasks) and with a specific time period, the scheduling operation is performed on them, in fact, the scheduling operation is done in groups and categories.…”
Section: Introductionmentioning
confidence: 99%