2019
DOI: 10.1109/tnet.2019.2930040
|View full text |Cite
|
Sign up to set email alerts
|

Learning Latent Events From Network Message Logs

Abstract: We consider the problem of separating error messages generated in large distributed data center networks into error events. In such networks, each error event leads to a stream of messages generated by hardware and software components affected by the event. These messages are stored in a giant message log. We consider the unsupervised learning problem of identifying the signatures of events that generated these messages; here, the signature of an error event refers to the mixture of messages generated by the e… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 31 publications
0
5
0
Order By: Relevance
“…We apply the compression ratio, i.e., size of summaries size of original logs , to evaluate the log compression performance. We compare LogSummary with three extractive summarization methods, namely, TF-IDF [38], LDA [13], TextRank (sentence summary) [27]).…”
Section: Evaluation On Ranking Summaries 1) Metrics and Baselinesmentioning
confidence: 99%
See 2 more Smart Citations
“…We apply the compression ratio, i.e., size of summaries size of original logs , to evaluate the log compression performance. We compare LogSummary with three extractive summarization methods, namely, TF-IDF [38], LDA [13], TextRank (sentence summary) [27]).…”
Section: Evaluation On Ranking Summaries 1) Metrics and Baselinesmentioning
confidence: 99%
“…Satpathi et al [13] proposed the first closely related work in our scenario. Their focus is different from ours as they aim to mine the distribution of messages for each anomalous event and their occurrences in the logs getting an event signature that represents it formed by keywords.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The system log is the first place where the system administrator investigates issues on failure alerts. Consequently, system logs have been widely used in anomaly and failure detection or prediction because of their directness and usefulness [5][6] [7] [8]. Complex computer systems record a massive collection of logs that can make useful information available; on the other hand, analyzing colossal data is challenging.…”
Section: Introductionmentioning
confidence: 99%
“…Because of its simplicity and effectiveness, logging has been commonly adopted in practice [6]. Logs are therefore one of the most valuable data sources for anomaly detection [7]- [9].…”
Section: Introductionmentioning
confidence: 99%