2022
DOI: 10.48550/arxiv.2207.03820
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Deep Learning for Anomaly Detection in Log Data: A Survey

Abstract: Automatic log file analysis enables early detection of relevant incidents such as system failures. In particular, selflearning anomaly detection techniques capture patterns in log data and subsequently report unexpected log event occurrences to system operators without the need to provide or manually model anomalous scenarios in advance. Recently, an increasing number of approaches leveraging deep learning neural networks for this purpose have been presented. These approaches have demonstrated superior detecti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 98 publications
0
3
0
Order By: Relevance
“…In our experiments, four public log datasets, HDFS, BGL, Spirit and Thunderbird, are used to evaluate the proposed approach and the relevant baseline methods. The datasets are widely used in log analysis research [1]- [3], [5], [45], [46] because all of them come from real-world datasets and are labeled either manually by system administrators or through alert tags automatically generated by their systems. We obtained all the log datasets from the publicly available websites.…”
Section: A Datasetsmentioning
confidence: 99%
See 1 more Smart Citation
“…In our experiments, four public log datasets, HDFS, BGL, Spirit and Thunderbird, are used to evaluate the proposed approach and the relevant baseline methods. The datasets are widely used in log analysis research [1]- [3], [5], [45], [46] because all of them come from real-world datasets and are labeled either manually by system administrators or through alert tags automatically generated by their systems. We obtained all the log datasets from the publicly available websites.…”
Section: A Datasetsmentioning
confidence: 99%
“…Also, LogGD identifies anomalies at the graph level. Developers and operators may have to inspect each event in the data window to locate the potential fault [46]. It would be interesting to explore the feasibility of more fine-grained anomaly detection to reduce the effort and time to locate a fault.…”
Section: A the Advantages And Limitations Of Loggdmentioning
confidence: 99%
“…Anomalies such as unplanned production downtimes cost industrial manufacturers around $50 billion per year [27], and real-world examples for anomalies caused by cyber-attacks with financial losses for the victims are given in Sections 2.1 and 2.2. Hence, it is not surprising that the timely detection of anomalies is already the focus of a large number of research activities [26,[28][29][30]. As already stated in the Introduction, the high dynamics and the high level of connectivity between production systems offer new potential for optimized production but lead at the same time to new challenges in anomaly detection, such as the problem of detecting anomalies in frequently changing factory situations and the detection of cyber-attacks in addition to anomalies in system and process behavior.…”
Section: Anomaly Detection and Mitigationmentioning
confidence: 99%