Proceedings of the 13th ACM Workshop on Hot Topics in Storage and File Systems 2021
DOI: 10.1145/3465332.3470873
|View full text |Cite
|
Sign up to set email alerts
|

SentiLog

Abstract: As one core component of high-performance computing (HPC) platforms, parallel file systems (PFSes) grow quickly in scale and complexity, which makes them vulnerable to various failures or anomalies. Identifying PFS anomalies in runtime is thus critically helpful for HPC users and administrators. Analyzing runtime logs to detect the anomalies of large-scale systems has been proven effective in many recent studies. However, applying existing log analysis to PFSes faces significant challenges due to the large vol… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 16 publications
(3 citation statements)
references
References 36 publications
0
3
0
Order By: Relevance
“…Log-based anomaly detection has been applied widely to various systems, such as operating systems [9], [10], parallel file systems [26], drones [11], [18], [20], internet of things [28], and industrial control systems [29]. Among these studies, a sequence-based approach is the common modelling technique used, where the detection is observed on a collection of log events.…”
Section: A Anomaly Detection On Logs Datamentioning
confidence: 99%
See 1 more Smart Citation
“…Log-based anomaly detection has been applied widely to various systems, such as operating systems [9], [10], parallel file systems [26], drones [11], [18], [20], internet of things [28], and industrial control systems [29]. Among these studies, a sequence-based approach is the common modelling technique used, where the detection is observed on a collection of log events.…”
Section: A Anomaly Detection On Logs Datamentioning
confidence: 99%
“…1) Pylogsentiment [9] is the first study which employs sentiment analysis-based anomaly detection on operating system logs using GRU and GloVe embedding. 2) SentiLog [26], similar to [9], use a two-layered BiL-STM and GloVe embedding model to perform anomaly detection on parallel file system logs. 3) TransSentLog [10] is a further development of [9] and uses a two-layered transformer encoder which used two attention heads and GloVe embedding along with integrated gradients to add explainability to the trained model.…”
Section: ) Baseline From Previous Workmentioning
confidence: 99%
“…In an effort to combine sentiment and aspect terms within a log event, [13] introduces two attention mechanisms: context attention and content attention, along with a GRU network, for sentiment classification of log events. In order to develop a generic model, SentiLog [14] extracts logging statements obtained from various source codes of parallel file systems for training purposes. Although this approach demonstrates promising results, accessing source codes to collect logging statements is not feasible in practice.…”
Section: Related Workmentioning
confidence: 99%