2021
DOI: 10.3390/s21186125
|View full text |Cite
|
Sign up to set email alerts
|

ConAnomaly: Content-Based Anomaly Detection for System Logs

Abstract: Enterprise systems typically produce a large number of logs to record runtime states and important events. Log anomaly detection is efficient for business management and system maintenance. Most existing log-based anomaly detection methods use log parser to get log event indexes or event templates and then utilize machine learning methods to detect anomalies. However, these methods cannot handle unknown log types and do not take advantage of the log semantic information. In this article, we propose ConAnomaly,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 33 publications
(38 reference statements)
0
4
0
Order By: Relevance
“…It turns out that data instability, i.e., the appearance of previously unknown events, is one of the main issues addressed by the reviewed approaches. The key idea to resolving this problem is currently to represent logs as semantic vectors so that new or changed events can still be compared to known events by measuring their similarities [17], [28], [41], [46], [48], [50], [57], [65], [69], [73]. There are many techniques for generating numeric vectors to represent log events (cf.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…It turns out that data instability, i.e., the appearance of previously unknown events, is one of the main issues addressed by the reviewed approaches. The key idea to resolving this problem is currently to represent logs as semantic vectors so that new or changed events can still be compared to known events by measuring their similarities [17], [28], [41], [46], [48], [50], [57], [65], [69], [73]. There are many techniques for generating numeric vectors to represent log events (cf.…”
Section: Discussionmentioning
confidence: 99%
“…comp. Failures [1], [17], [20], [22], [23], [25], [27], [29]- [31], [33], [37]- [40], [42], [44], [46]- [48], [51], [52], [55], [56], [58], [59], [61], [62], [65]- [74], [76]- [78] BlueGene/L (BGL) [89] 2007 High-perf. comp.…”
Section: Data Setmentioning
confidence: 99%
See 1 more Smart Citation
“…DL techniques commonly employed for IDSs include convolutional neural networks for spatial pattern recognition in network traffic [8], recurrent neural networks such as LSTMs for analyzing sequential data such as system logs [9], and autoencoders for anomaly detection by learning compressed representations of normal behavior [10]. While these techniques offer solutions for detecting various cyberthreats and anomalies in diverse network environments, they often require fixed training datasets and may lack the ability to adapt dynamically to new threats.…”
Section: Dl-based Ids Researchmentioning
confidence: 99%