2017 IEEE 10th International Conference on Cloud Computing (CLOUD) 2017
DOI: 10.1109/cloud.2017.64
|View full text |Cite
|
Sign up to set email alerts
|

LogSed: Anomaly Diagnosis through Mining Time-Weighted Control Flow Graph in Logs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
21
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 55 publications
(21 citation statements)
references
References 16 publications
0
21
0
Order By: Relevance
“…The authors in [7,8] introduced a classic log mining method to diagnose and locate anomalies in traditional distributed systems. According to the research in [9][10][11], the log mining method also plays an important role in the RCA of cloud applications. However, not all abnormal behaviors are recorded in logs: in many cases of RCA, in addition to log mining, O&M personnel have to combine their domain experience to find the root cause.…”
Section: Related Workmentioning
confidence: 99%
“…The authors in [7,8] introduced a classic log mining method to diagnose and locate anomalies in traditional distributed systems. According to the research in [9][10][11], the log mining method also plays an important role in the RCA of cloud applications. However, not all abnormal behaviors are recorded in logs: in many cases of RCA, in addition to log mining, O&M personnel have to combine their domain experience to find the root cause.…”
Section: Related Workmentioning
confidence: 99%
“…For this reason, the solution has limited usability regarding full automation. Authors of [31] propose an approach to mine time-weighted graphs from logs with many threads running. The solution evaluated on the cloud environment performs with high f1-score that is about 80%.…”
Section: Mining Logs For Root Cause Classification and Diagnosticsmentioning
confidence: 99%
“…Despite achieving promising results in terms of the detection precision and false positives, advanced attacks may penetrate the network to deliberately inject malicious code or even to disrupt the normal execution [4]. In addition, the legitimate software components-defined by the car manufactures during the design time-may exhibit abnormal behavior due to software/hardware malfunctioning.…”
Section: Introductionmentioning
confidence: 99%
“…Accordingly, the concept of solely observing the communication network is typically not sufficient for ensuring high-level of safety and security. Such a conclusion opened the door for developing several hostbased anomaly detection algorithms on the operating system level [5], [4], [6]. In this context, observing the computation time of the software components has been proposed to detect unexpected or suspicious behavior of such components [6].…”
Section: Introductionmentioning
confidence: 99%