2019
DOI: 10.1186/s13638-019-1430-4
|View full text |Cite
|
Sign up to set email alerts
|

An online log template extraction method based on hierarchical clustering

Abstract: The raw log messages record extremely rich system, network, and application running dynamic information that is a good data source for abnormal detection. Log template extraction is an important prerequisite for log sequence anomaly detection. The problems of the existing log template extraction methods are mostly offline, and the few online methods have insufficient F1-score in multi-source log data. In view of the shortcomings of the existing methods, an online log template extraction method called LogOHC is… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 13 publications
(4 citation statements)
references
References 32 publications
0
4
0
Order By: Relevance
“…A log sequence can be considered as a series of events that occur, namely, the sequence of the log template corresponding to the original log sequence. The extraction of log templates from the original log has been studied in literature [35]. The study work in this paper is to detect the anomaly of the log template sequence corresponding to the original log sequence.…”
Section: Nlsalog Frameworkmentioning
confidence: 99%
“…A log sequence can be considered as a series of events that occur, namely, the sequence of the log template corresponding to the original log sequence. The extraction of log templates from the original log has been studied in literature [35]. The study work in this paper is to detect the anomaly of the log template sequence corresponding to the original log sequence.…”
Section: Nlsalog Frameworkmentioning
confidence: 99%
“…This study compiles available evaluation results using these metrics for method comparisons. Although Dendrogram purity [35], Levenshtein edit distance [226], and loss functions [34] also appear, they are used infrequently. Also, there are a number of studies that use a stricter form of PA (i.e., requiring all dynamic parameters to be identified for the template to be considered correctly parsed) [30] [194].…”
Section: B Other Performance Metricsmentioning
confidence: 99%
“…Xu et al [5] utilized PCA to identify abnormal events and visualize the final results. Yang et al [35] proposed LogOHC, which has high extraction efficiency in multi-source log datasets. Unsupervised learning with high automation saves labor costs, but most detection uses clustering and correlation analysis, and the degree of automated correlation between these methods is not high.…”
Section: Anomaly Detectionmentioning
confidence: 99%