2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA) 2016
DOI: 10.1109/icmla.2016.0158
|View full text |Cite
|
Sign up to set email alerts
|

Relational Synthesis of Text and Numeric Data for Anomaly Detection on Computing System Logs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0
1

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(15 citation statements)
references
References 7 publications
0
14
0
1
Order By: Relevance
“…The algorithm thus does not detect these bursts as anomalies. (2) Intensive bursts cause CVAE and PCA to detect a relatively small burst as a normal. Figure 6 is a histogram of detected anomalies per log category.…”
Section: Results Overviewmentioning
confidence: 99%
See 2 more Smart Citations
“…The algorithm thus does not detect these bursts as anomalies. (2) Intensive bursts cause CVAE and PCA to detect a relatively small burst as a normal. Figure 6 is a histogram of detected anomalies per log category.…”
Section: Results Overviewmentioning
confidence: 99%
“…Many studies have been conducted for finding anomalies and their root causes [2], [4], [5] in log data. Zhong et al [3] proposed an anomaly detection method for both device and network errors with fine log time series feature creation.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…As a final step data mining techniques like clustering and association analysis are deployed to discover the interesting patterns and evaluate them to make final decisions. Efforts [77,95], used this approach to extract interesting patterns for the anomaly detection in NVE. Baseman et al [77], presented a method for anomaly detection based on syslog data collected from VMs.…”
Section: Log Analytics and Data Miningmentioning
confidence: 99%
“…Efforts [77,95], used this approach to extract interesting patterns for the anomaly detection in NVE. Baseman et al [77], presented a method for anomaly detection based on syslog data collected from VMs. They extract the Infomap clusters on textual data; and relational features on numeric data and combine their features with keyword counts to create a single data set.…”
Section: Log Analytics and Data Miningmentioning
confidence: 99%