2021
DOI: 10.48550/arxiv.2104.07324
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

OneLog: Towards End-to-End Training in Software Log Anomaly Detection

Abstract: In recent years, with the growth of online services and IoT devices, software log anomaly detection has become a significant concern for both academia and industry. However, at the time of writing this paper, almost all contributions to the log anomaly detection task, follow the same traditional architecture based on parsing, vectorizing, and classifying.This paper proposes OneLog, a new approach that uses a large deep model based on instead of multiple small components. OneLog utilizes a character-based convo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(7 citation statements)
references
References 20 publications
0
7
0
Order By: Relevance
“…Guo et al [38] are the only authors to consider federated learning, where learning takes place in a distributed manner across multiple systems. Hashemi et al [42] also go into this direction as they combine multiple data sets to evaluate whether this affects the performance of their model. We believe that federated learning could be an interesting topic for future publications as there exist many real-world scenarios where log data is monitored in distributed machines but orchestration of deployed detectors takes place centrally [106].…”
Section: Discussionmentioning
confidence: 99%
See 4 more Smart Citations
“…Guo et al [38] are the only authors to consider federated learning, where learning takes place in a distributed manner across multiple systems. Hashemi et al [42] also go into this direction as they combine multiple data sets to evaluate whether this affects the performance of their model. We believe that federated learning could be an interesting topic for future publications as there exist many real-world scenarios where log data is monitored in distributed machines but orchestration of deployed detectors takes place centrally [106].…”
Section: Discussionmentioning
confidence: 99%
“…Some authors also use custom embedding models based on deep learning; we refer to their output as Deep Encoded Embeddings (DE). This includes a combination of character-, event-and sequence-based embeddings [42], attention mechanisms using MLPs and CNNs [45], and token counts with label information fed into VAEs [1].…”
Section: Log Data Preparationmentioning
confidence: 99%
See 3 more Smart Citations