2020
DOI: 10.3390/s20092451
|View full text |Cite
|
Sign up to set email alerts
|

LogEvent2vec: LogEvent-to-Vector Based Anomaly Detection for Large-Scale Logs in Internet of Things

Abstract: Log anomaly detection is an efficient method to manage modern large-scale Internet of Things (IoT) systems. More and more works start to apply natural language processing (NLP) methods, and in particular word2vec, in the log feature extraction. Word2vec can extract the relevance between words and vectorize the words. However, the computing cost of training word2vec is high. Anomalies in logs are dependent on not only an individual log message but also on the log message sequence. Therefore, the vector of words… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
29
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
3
1

Relationship

2
7

Authors

Journals

citations
Cited by 77 publications
(29 citation statements)
references
References 46 publications
0
29
0
Order By: Relevance
“…Finally, future research will be focused on solving the obstacle avoidance and the path following control tasks by using the approach presented in this paper. On the other hand, and with the aim of possibly generating a new direction for this research topic, it would be interesting to implement some kind of learning technology such as machine learning [ 45 ] or Internet of things (IoT) [ 46 , 47 ]. Also, using wireless network sensors (WSNs) [ 48 ] could be another interesting path for highlighting even more the research proposed in this paper.…”
Section: Discussionmentioning
confidence: 99%
“…Finally, future research will be focused on solving the obstacle avoidance and the path following control tasks by using the approach presented in this paper. On the other hand, and with the aim of possibly generating a new direction for this research topic, it would be interesting to implement some kind of learning technology such as machine learning [ 45 ] or Internet of things (IoT) [ 46 , 47 ]. Also, using wireless network sensors (WSNs) [ 48 ] could be another interesting path for highlighting even more the research proposed in this paper.…”
Section: Discussionmentioning
confidence: 99%
“…LSTM model needs to be trained with a large amount of normal data, but the original dataset cannot be all normal which may contain some abnormal log. These works can not cope with the evolution of log statements, especially in the case of new log templates [17], which greatly limits their applicability in practice. Log instability is common, but there are few works on it.…”
Section: Related Workmentioning
confidence: 99%
“…Within time series analysis, we distinguish four research goals: (i) TS decomposition [3,8], which it involves deriving trend, season, noise and other specified components; (ii) TS classification [9][10][11], based on comparing time series with each other and finding similarities using diverse metrics; (iii) deriving characteristic and anomalous features [12][13][14]; and (iv) predicting future behaviour [3,4,15] by finding data patterns for the near future based on the previous/historical ones. They are considered as general or applicationtargeted problems.…”
Section: Problem Statement and Related Workmentioning
confidence: 99%