Proceedings of the 44th International Conference on Software Engineering 2022
DOI: 10.1145/3510003.3510155
|View full text |Cite
|
Sign up to set email alerts
|

Log-based anomaly detection with deep learning

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
46
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 103 publications
(46 citation statements)
references
References 29 publications
0
46
0
Order By: Relevance
“…The dataset contains suitably labeled normal and alert events, with the alert events considered as anomalies. The BGL dataset does not have a session ID with which to group the data, thus the dataset is chunked into log paragraphs, each consisting of the consecutive log sentences belonging to a time window of 30 seconds, following the approach discussed in [5], [7]. A log paragraph is considered an anomaly if it includes at least one log sentence that is tagged as an anomalous event.…”
Section: A Experimental Setupmentioning
confidence: 99%
See 3 more Smart Citations
“…The dataset contains suitably labeled normal and alert events, with the alert events considered as anomalies. The BGL dataset does not have a session ID with which to group the data, thus the dataset is chunked into log paragraphs, each consisting of the consecutive log sentences belonging to a time window of 30 seconds, following the approach discussed in [5], [7]. A log paragraph is considered an anomaly if it includes at least one log sentence that is tagged as an anomalous event.…”
Section: A Experimental Setupmentioning
confidence: 99%
“…The dataset has also been labeled in the same manner as the BGL data set. As with the BGL dataset, the Thunderbird dataset does not have a session ID, so the log sentences are similarly chunked into paragraphs, each consisting of the consecutive sentences belonging to a time window of 30 seconds, following the approach discussed in [5], [7]. Furthermore, a log paragraph is considered an anomaly if it includes at least one log sentence that is tagged as an anomalous event.…”
Section: A Experimental Setupmentioning
confidence: 99%
See 2 more Smart Citations
“…Log Analysis with Language Models: Log analysis is a research area that has attracted lots of attention due to its practical importance. Typical applications of log analysis include anomaly detection [1], [54], [55], [56], failure prediction [7], [8], root cause analysis [5], [6], etc. Recently, inspired by the success of pre-trained models in NLP, many studies have been proposed to apply pre-trained language models to log analysis.…”
Section: Related Workmentioning
confidence: 99%