Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of 2019
DOI: 10.1145/3338906.3338931
|View full text |Cite
|
Sign up to set email alerts
|

Robust log-based anomaly detection on unstable log data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
288
0
4

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 435 publications
(292 citation statements)
references
References 33 publications
0
288
0
4
Order By: Relevance
“…It designs a fast cascading clustering algorithm for iteratively sampling, clustering, and matching log sequences and then identifies the problems by correlating the clusters with system KPIs. To identify and handle unstable log events and sequences, LogRobust [14] was proposed, which can extract semantic information of log events and then detects anomalies by utilizing an attention-based Bi-LSTM model. Though He et al [7] has found that supervised approaches usually achieve better performances than unsupervised approaches, the biggest concern for the supervised approaches is that they require labelled logs to train the models.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…It designs a fast cascading clustering algorithm for iteratively sampling, clustering, and matching log sequences and then identifies the problems by correlating the clusters with system KPIs. To identify and handle unstable log events and sequences, LogRobust [14] was proposed, which can extract semantic information of log events and then detects anomalies by utilizing an attention-based Bi-LSTM model. Though He et al [7] has found that supervised approaches usually achieve better performances than unsupervised approaches, the biggest concern for the supervised approaches is that they require labelled logs to train the models.…”
Section: Related Workmentioning
confidence: 99%
“…sessions, fixed windows, and sliding windows. Grouping by sessions is to classify the log events by certain identifiers, such as TaskID, InstanceID, or BlockID [14], [15], [7]. Grouping by fixed or sliding windows are based on the timestamps of the log entries.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…There has been extensive research in the detection of anomalies or outliers in logs using both machine learning approaches and using relations across multivariate time-series data in several application domains [14,17,18,[24][25][26][27][28][29][30][31]. In this section, we review a set of representative examples of outlier detection applied to log analysis, and highlight a key focus of the contributions of our paper in the context of these rich body of prior art.…”
Section: Related Workmentioning
confidence: 99%
“…The method does not leverage domain knowledge or filter for false positives as done in our current work. The most recent work in the log anomaly detection field is the LogRobust [31]. Zhang et al have developed a Bi-LSTM classification model from the fixed dimension semantic vectors of logs and improved the anomaly detection capability.…”
Section: Related Workmentioning
confidence: 99%