Proceedings of the 2014 SIAM International Conference on Data Mining 2014
DOI: 10.1137/1.9781611973440.104
|View full text |Cite
|
Sign up to set email alerts
|

Online Anomaly Detection by Improved Grammar Compression of Log Sequences

Abstract: Nowadays, log sequences mining techniques are widely used in detecting anomalies for Internet services. The state-ofthe-art anomaly detection methods either need significant computational costs, or require specific assumptions that the test logs are holding certain data distribution patterns in order to be effective. Therefore, it is very difficult to achieve real time responses and it greatly reduces the effectiveness of these mechanisms in reality.To address these issues, we propose an innovative anomaly det… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 20 publications
0
3
0
Order By: Relevance
“…Researchers have been trying several different techniques, such as deep learning and NLP ( Du et al, 2017 ; Bertero et al, 2017 ; Meng et al, 2019 ; Zhang et al, 2019 ), data mining, statistical learning methods, and machine learning ( Lu et al, 2017 ; He et al, 2016b ; Ghanbari, Hashemi & Amza, 2014 ; Tang & Iyer, 1992 ; Lim, Singh & Yajnik, 2008 ; Xu et al, 2009b , Xu et al, 2009a ) control flow graph mining from execution logs ( Nandi et al, 2016 ), finite state machines ( Fu et al, 2009 ; Debnath et al, 2018 ), frequent itemset mining ( Lim, Singh & Yajnik, 2008 ), dimensionality reduction techniques ( Juvonen, Sipola & Hämäläinen, 2015 ), grammar compression of log sequences ( Gao et al, 2014 ), and probabilistic suffix trees ( Bao et al, 2018 ).…”
Section: Resultsmentioning
confidence: 99%
“…Researchers have been trying several different techniques, such as deep learning and NLP ( Du et al, 2017 ; Bertero et al, 2017 ; Meng et al, 2019 ; Zhang et al, 2019 ), data mining, statistical learning methods, and machine learning ( Lu et al, 2017 ; He et al, 2016b ; Ghanbari, Hashemi & Amza, 2014 ; Tang & Iyer, 1992 ; Lim, Singh & Yajnik, 2008 ; Xu et al, 2009b , Xu et al, 2009a ) control flow graph mining from execution logs ( Nandi et al, 2016 ), finite state machines ( Fu et al, 2009 ; Debnath et al, 2018 ), frequent itemset mining ( Lim, Singh & Yajnik, 2008 ), dimensionality reduction techniques ( Juvonen, Sipola & Hämäläinen, 2015 ), grammar compression of log sequences ( Gao et al, 2014 ), and probabilistic suffix trees ( Bao et al, 2018 ).…”
Section: Resultsmentioning
confidence: 99%
“…We use the method in [7] and the standard HMM for Markov methods, the method in [8] for statistical methods, the T-STDIE [4] method for window based methods and CADM [1] for compression based methods. As the Figure 3 shows, PADM is better than the other methods, demonstrated by the ROC of PADM which is very close to 1.…”
Section: B Performance Of Datanode Logsmentioning
confidence: 99%
“…Paper [4] and [5] review the existing discrete sequence of anomaly detection methods, and they concluded three different methods of discrete sequence anomaly detection. The anomaly detection work CADM is our previous work [1], which uses the relative entropy between normal logs and testing logs as an identity of anomaly degree. CADM bases on the convergence of the estimation of the divergence, for short sequences, this convergence may not be fully achieved.…”
Section: Performance Of Scalabilitymentioning
confidence: 99%