2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS) 2018
DOI: 10.1109/icdcs.2018.00105
|View full text |Cite
|
Sign up to set email alerts
|

LogLens: A Real-Time Log Analysis System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
34
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 83 publications
(34 citation statements)
references
References 12 publications
0
34
0
Order By: Relevance
“…After feature extraction, several machine learning models are used for anomaly detection, such as Regression [30], Random Forest [29,32], and Clustering [33,38,42].…”
Section: Anomaly Detectionmentioning
confidence: 99%
“…After feature extraction, several machine learning models are used for anomaly detection, such as Regression [30], Random Forest [29,32], and Clustering [33,38,42].…”
Section: Anomaly Detectionmentioning
confidence: 99%
“…Aver − sim(S, P)+ � J(S, S pi ) (4) end for (5) for j � 1 ⟶ n do (6) Aver − sim(S, F)+ � J(S, S fi ) (7) end for (8) if Aver − sim(S, P)+ � J(S, S pi ) ≥ Aver − sim(S, F)+ � J(S, S fi ) then (9) return normal ( 10) else (11) return abnormal (12) end if (21) end function ALGORITHM 4: e strategy of anomaly detection. As described in Section 3, the log-based anomaly detection method proposed in this paper is based on kNN algorithm, which is an outlier detection method in machine learning.…”
Section: Log Datamentioning
confidence: 99%
“…Reference [6] uses a clustering algorithm to sort the log sequences, which is an outlier detection method and the same as our method. e methods in [8,9] are not outlier detection methods; [8] uses an anomaly detection method based on finite state automaton and [9] uses the information entropy of log messages for identifying exceptions.…”
Section: Log Datamentioning
confidence: 99%
See 1 more Smart Citation
“…Lastly, Debnath et al [32] envision LogLens, an anomaly detection system that analyzes log files in real time. It works with minimal or even no target system knowledge and user specification: it learns normal behavior and builds a finitestate machine that captures it, with which it then detects anomalies.…”
Section: Introductionmentioning
confidence: 99%