2020 IEEE International Conference on Software Maintenance and Evolution (ICSME) 2020
DOI: 10.1109/icsme46990.2020.00069
|View full text |Cite
|
Sign up to set email alerts
|

Improving Log-Based Anomaly Detection with Component-Aware Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 22 publications
(4 citation statements)
references
References 18 publications
0
4
0
Order By: Relevance
“…For example, session windows can be used when a session identifier is available (e.g., the block ID present in the HDFS dataset). Generally, fixed or sliding windows are selected when these identifiers are unavailable (as with the ThunderBird dataset) [236]. Therefore, the window type is less a feature of the log anomaly detection method and more an adaptation based on the log being monitored.…”
Section: ) Encodingmentioning
confidence: 99%
“…For example, session windows can be used when a session identifier is available (e.g., the block ID present in the HDFS dataset). Generally, fixed or sliding windows are selected when these identifiers are unavailable (as with the ThunderBird dataset) [236]. Therefore, the window type is less a feature of the log anomaly detection method and more an adaptation based on the log being monitored.…”
Section: ) Encodingmentioning
confidence: 99%
“…In addition, there are rule-based [15], tree-based [16], statistical [17], as well as methods based on clustering [18,19,20,21]. Whereas recent anomaly detection methods are mainly designed with neural networks [22,23,24] and based on encoder architectures [25,26]. Equally, recent methods utilizing the attention mechanism that is often used in encoder architectures [27].…”
Section: Related Workmentioning
confidence: 99%
“…-Failures [24], [34]- [36], [38]- [41], [55], [60], [64], [71], [73] OpenStack [20] 2017 Virtual machines Failures [20], [26], [34]- [36], [42], [44], [50], [52], [63], [76]- [78] Hadoop [90] 2016 High-perf. comp.…”
Section: Data Setmentioning
confidence: 99%