2019
DOI: 10.1587/transinf.2018ofp0007
|View full text |Cite
|
Sign up to set email alerts
|

Latent Variable Based Anomaly Detection in Network System Logs

Abstract: System logs are useful to understand the status of and detect faults in large scale networks. However, due to their diversity and volume of these logs, log analysis requires much time and effort. In this paper, we propose a log event anomaly detection method for large-scale networks without pre-processing and feature extraction. The key idea is to embed a large amount of diverse data into hidden states by using latent variables. We evaluate our method with 12 months of system logs obtained from a nationwide ac… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 16 publications
(12 citation statements)
references
References 20 publications
0
12
0
Order By: Relevance
“…Various classification techniques have been applied to identify the abnormalities in application behavior for fault detection in the study by researchers Jain et al (2009). In the research by Otomo et al (2018Otomo et al ( , 2019 Natural Language Processing algorithms were used for log analysis considering log data as a normal text file.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Various classification techniques have been applied to identify the abnormalities in application behavior for fault detection in the study by researchers Jain et al (2009). In the research by Otomo et al (2018Otomo et al ( , 2019 Natural Language Processing algorithms were used for log analysis considering log data as a normal text file.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Farzad et al [21] proposed to use a generative adversarial network (GAN) to carry out synthetic sampling, with the goal of enhancing data modeling. Several kinds of research of this approach are [20] and [24]. However, the remaining challenge is to integrate the imbalanced datasets solution (as presented in Section II-A) and the learning model as a hybrid process.…”
Section: B Ml/dl-based Intrusion Detection Systemsmentioning
confidence: 99%
“…Any input data that is fed into an already trained network and yields a high reconstruction error is then considered as anomalous. Besides the standard model for Autoencoders, there are also several related types, such as Variational Autoencoders (VAE) that operate on statistical distributions [1], [52], [58], Conditional Variational Autoencoders (CVAE) that add conditional information such as event types to the training [49], and Convolutional Autoencoder (CAE) that leverage the advantages of CNNs regarding learning of location-independent features [58].…”
Section: B Deep Learning Techniquesmentioning
confidence: 99%