Proceedings of the Asian Internet Engineering Conference 2017
DOI: 10.1145/3154970.3154973
|View full text |Cite
|
Sign up to set email alerts
|

An Analysis of Burstiness and Causality of System Logs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
1

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 14 publications
0
4
0
Order By: Relevance
“…This paper focuses on discovering event correlations in an alert event sequence. According to our investigation, most correlation mining methods are generally based on pairwise correlations and assume that multiple correlations are composed of pairwise correlations from bottom to top [6,8,9]. As shown in Fig.…”
Section: Motivationmentioning
confidence: 99%
See 1 more Smart Citation
“…This paper focuses on discovering event correlations in an alert event sequence. According to our investigation, most correlation mining methods are generally based on pairwise correlations and assume that multiple correlations are composed of pairwise correlations from bottom to top [6,8,9]. As shown in Fig.…”
Section: Motivationmentioning
confidence: 99%
“…Zhang et al [22] proposed CloudPin, a root cause localization framework employing a multidimensional algorithm with three submodels for prediction deviation, anomaly amplitude, and shape similarity. Otomo et al [9] focused on the burstiness and causality of log time series data to extract meaningful information for troubleshooting. Zhang et al [23] proposed a root cause analysis framework called CloudRCA, which uses heterogeneous multisource data, including KPIs, logs, and topologies.…”
Section: Correlation and Causality Miningmentioning
confidence: 99%
“…Otomo et al [24] conducted log analysis focusing on the burstiness and causality of log time series. They first removed trivial logs (e.g., periodic and very frequent logs) to prevent detecting trivial bursts then detected log bursts with Kleinberg's burst detection [8].…”
Section: Burst Detectionmentioning
confidence: 99%
“…The three algorithms are summarized in Table 2. 4.2.1 Burst detection. Otomo et al [13] conducted log analysis focusing on the burstiness and causality of log time series. They first removed trivial logs (e.g., periodic and very frequent logs) to prevent detecting trivial bursts then detected log bursts with Kleinberg's burst detection [8].…”
Section: Baseline Algorithmsmentioning
confidence: 99%