2022 IEEE International Conference on Software Maintenance and Evolution (ICSME) 2022
DOI: 10.1109/icsme55016.2022.00050
|View full text |Cite
|
Sign up to set email alerts
|

How to Configure Masked Event Anomaly Detection on Software Logs?

Abstract: Software Log anomaly event detection with masked event prediction has various technical approaches with countless configurations and parameters. Our objective is to provide a baseline of settings for similar studies in the future. The models we use are the N-Gram model, which is a classic approach in the field of natural language processing (NLP), and two deep learning (DL) models long short-term memory (LSTM) and convolutional neural network (CNN). For datasets we used four datasets Profilence, BlueGene/L (BG… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 23 publications
(50 reference statements)
0
1
0
Order By: Relevance
“…BIRCH is used to identify anomalies, and root cause analysis (RCA) is performed by employing a graph that represents anomaly transmission across systems. Additionally, there is recent research in this field as discussed in [44][45][46][47][48][49][50][51][52][53].…”
Section: Literature Reviewmentioning
confidence: 99%
“…BIRCH is used to identify anomalies, and root cause analysis (RCA) is performed by employing a graph that represents anomaly transmission across systems. Additionally, there is recent research in this field as discussed in [44][45][46][47][48][49][50][51][52][53].…”
Section: Literature Reviewmentioning
confidence: 99%