2017 IEEE 28th International Symposium on Software Reliability Engineering (ISSRE) 2017
DOI: 10.1109/issre.2017.43
|View full text |Cite
|
Sign up to set email alerts
|

Experience Report: Log Mining Using Natural Language Processing and Application to Anomaly Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
83
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 110 publications
(91 citation statements)
references
References 20 publications
(32 reference statements)
0
83
0
Order By: Relevance
“…1 presents one of the diff regions, i.e., deletion of a set of vertices T 1103-T 1109 (represented as dashed) from class Fetcher.java and addition of new vertices EXT 0-EXT 5 (double circled) from apparently third party library (prefixed with EXT). We manually investigated this diff region and found that the code fragment corresponding to templates T 1103-T 1109 has been moved from Fetcher.java to FetchItemQueue.java 4 . Inspecting FetchItemQueue.java we found that FetchItemQueues is used as logger instead of FetchItemQueue.…”
Section: Motivating Example: a Bug In Nutchmentioning
confidence: 99%
“…1 presents one of the diff regions, i.e., deletion of a set of vertices T 1103-T 1109 (represented as dashed) from class Fetcher.java and addition of new vertices EXT 0-EXT 5 (double circled) from apparently third party library (prefixed with EXT). We manually investigated this diff region and found that the code fragment corresponding to templates T 1103-T 1109 has been moved from Fetcher.java to FetchItemQueue.java 4 . Inspecting FetchItemQueue.java we found that FetchItemQueues is used as logger instead of FetchItemQueue.…”
Section: Motivating Example: a Bug In Nutchmentioning
confidence: 99%
“…One of the conventional approaches to deal with log preprocessing and comparison is transforming log entries to vectors, using the Word2Vec algorithm [33], [34]. A recent attempt to leverage Word2Vec for root cause classification is described in [35]. The authors propose a method for processing logs with a Word2Vec model and then using a Bayesian classifier.…”
Section: Mining Logs For Root Cause Classification and Diagnosticsmentioning
confidence: 99%
“…Due to system logs do contain critical alarm information, they are widely used in predicting system failures [Stearley and Oliner, 2008]. Many efforts have been put into the field of anomaly detection by analysis of the log files [Stearley, 2004, Reuning, 2004, Vaarandi, 2004, Salfner et al, 2004, Prewett and James, 2004, Liang et al, 2006, 2007b,a, Oliner and Stearley, 2007, Bezerra and Wainer, 2013, Sipos et al, 2014, Ghanbari et al, 2014, Juvonen and Hamalainen, 2014, Du and Cao, 2015, Breier and Branišová, 2015, He et al, 2016, Li et al, 2017, Bertero et al, 2017, Vinayakumar et al, 2017, Landauer et al, 2018, Hu et al, 2018. Given the system logs, we concentrate on learning the correlations between KPI data and alarm cases on the basis of machine learning methods.…”
Section: Introductionmentioning
confidence: 99%