Proceedings of the Eleventh ACM SIGKDD International Conference on Knowledge Discovery in Data Mining 2005
DOI: 10.1145/1081870.1081972
|View full text |Cite
|
Sign up to set email alerts
|

An integrated framework on mining logs files for computing system management

Abstract: Traditional approaches to system management have been largely based on domain experts through a knowledge acquisition process that translates domain knowledge into operating rules and policies. This has been well known and experienced as a cumbersome, labor intensive, and error prone process. In addition, this process is difficult to keep up with the rapidly changing environments. In this paper, we will describe our research efforts on establishing an integrated framework for mining system log files for automa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
39
0

Year Published

2009
2009
2021
2021

Publication Types

Select...
5
3
2

Relationship

3
7

Authors

Journals

citations
Cited by 57 publications
(39 citation statements)
references
References 16 publications
0
39
0
Order By: Relevance
“…Discovering time-related patterns from system logs is considered in [18], [33]. In our study, the duration time of a pattern depends on a couple of factors such as actual delay time and acceptable SLA thresholds.…”
Section: Related Workmentioning
confidence: 99%
“…Discovering time-related patterns from system logs is considered in [18], [33]. In our study, the duration time of a pattern depends on a couple of factors such as actual delay time and acceptable SLA thresholds.…”
Section: Related Workmentioning
confidence: 99%
“…Salfner et al proposed a logfile structure consisting of hierarchical numbering of event types and sources such that it is amenable for automatic log analysis techniques like clustering [16]. Li et al proposed an integrated framework to mine logs to infer temporal dependency between log events from the cumulative distribution function of the events' waiting times [12]. Palatin et al employed a distributed outlier detection algorithm HilOut, a variant of the nearest neighbor approach, over processed log files stored in different nodes of a grid system to identify misconfigured machines [15].…”
Section: Related Workmentioning
confidence: 99%
“…Detecting message patterns may focus on frequency of occurrences [21]. Another method is to analyze time correlation and utilize text analysis algorithms [15,20].…”
Section: Security-related Eventsmentioning
confidence: 99%