The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2021
DOI: 10.1007/978-3-030-91431-8_47
|View full text |Cite
|
Sign up to set email alerts
|

LogDP: Combining Dependency and Proximity for Log-Based Anomaly Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…Traditional ML-based methods, such as LR [8], SVM [9], PCA (Principal Component Analysis) [54] and LogCluster [10], are often more efficient compared with deep learning based methods in terms of time costs. Invariant relation mining-based methods, such as Invariants Mining [5], ADR [2] and LogDP [11], have the advantages of low labeling cost and interpretability because they usually work in semi-supervised or unsupervised mode and can capture meaningful relations. Despite these advantages, quantitative-based methods tend to suffer from unstable performance in some specific cases because they cannot capture sequential patterns and semantic information between log events.…”
Section: B Log-based Anomaly Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…Traditional ML-based methods, such as LR [8], SVM [9], PCA (Principal Component Analysis) [54] and LogCluster [10], are often more efficient compared with deep learning based methods in terms of time costs. Invariant relation mining-based methods, such as Invariants Mining [5], ADR [2] and LogDP [11], have the advantages of low labeling cost and interpretability because they usually work in semi-supervised or unsupervised mode and can capture meaningful relations. Despite these advantages, quantitative-based methods tend to suffer from unstable performance in some specific cases because they cannot capture sequential patterns and semantic information between log events.…”
Section: B Log-based Anomaly Detectionmentioning
confidence: 99%
“…We call such an approach quantitative-based approach. The representative methods of this approach include LR [8], SVM [9], LogCluster [10], Invariants Mining [5], ADR [2], and LogDP [11]. However, these methods tend to suffer from unstable performance on different datasets since their input only contains quantitative statistics.…”
Section: Introductionmentioning
confidence: 99%
“…In the event of a system failure, the most straightforward approach for maintenance personnel is to perform log analysis. However, manually identifying anomalies based on massive log data has become impractical [4,5]. Due to the rapid growth in log size, log analysis by experienced experts has become increasingly challenging [6].…”
Section: Introductionmentioning
confidence: 99%