Log Anomaly Detection Method Based on Transformer and Temporal Convolutional Networks

被引:0
作者
Liao, Niandong [1 ]
Liu, Zihan [1 ]
机构
[1] Changsha Univ Sci & Technol, Sch Comp Sci & Technol, Changsha 410114, Peoples R China
来源
IEEE ACCESS | 2025年 / 13卷
关键词
Anomaly detection; Semantics; Vectors; Transformers; Feature extraction; Long short term memory; Encoding; Deep learning; Convolution; Correlation; separable self-attention; transformer; temporal convolutional network;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As record files generated during system operation, logs play a vital role in ensuring system stability. However, the rapid development of distributed technologies has led to the increasing scale and complexity of log data, resulting in existing methods facing difficulties in fully mining log features and information loss during parsing. To overcome these difficulties, this study proposes TranConvAD, a global and local feature extraction method for log anomaly detection. The method extracts multidimensional features of logs from three perspectives: time, risk level, and message content, and designs FastText and BERT based multi-type word embedding methods for generating log representation vectors, aiming to minimize noise introduction and information loss. In addition, TranConvAD combines for the first time the global dependency capture of Transformer with the local temporal modeling of temporal convolutional networks. Furthermore, a separable self-attention mechanism and pointwise convolution are introduced to optimize the model. Experimental results demonstrate that TranConvAD achieves a maximum precision of 99.8% on the HDFS dataset, outperforming LogAnomaly by 3.8%, and 98.6% on the BGL dataset, surpassing LightLog by 3.4%, thereby providing a more efficient and scalable solution.
引用
收藏
页码:68547 / 68560
页数:14
相关论文
共 42 条
  • [1] Bojanowski P., 2017, Transactions of the Association for Computational Linguistics, V5, P135, DOI 10.1162/tacl_a_00051
  • [2] Detecting network cyber-attacks using an integrated statistical approach
    Bouyeddou, Benamar
    Harrou, Fouzi
    Kadri, Benamar
    Sun, Ying
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (02): : 1435 - 1453
  • [3] LogTransfer: Cross-System Log Anomaly Detection for Software Systems with Transfer Learning
    Chen, Rui
    Zhang, Shenglin
    Li, Dongwen
    Zhang, Yuzhe
    Guo, Fangrui
    Meng, Weibin
    Pei, Dan
    Zhang, Yuzhi
    Chen, Xu
    Liu, Yuqing
    [J]. 2020 IEEE 31ST INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE 2020), 2020, : 37 - 47
  • [4] Devlin J, 2019, 2019 CONFERENCE OF THE NORTH AMERICAN CHAPTER OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS: HUMAN LANGUAGE TECHNOLOGIES (NAACL HLT 2019), VOL. 1, P4171
  • [5] DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning
    Du, Min
    Li, Feifei
    Zheng, Guineng
    Srikumar, Vivek
    [J]. CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 1285 - 1298
  • [6] Du M, 2016, IEEE DATA MINING, P859, DOI [10.1109/ICDM.2016.0103, 10.1109/ICDM.2016.160]
  • [7] Towards Automated Log Parsing for Large-Scale Log Data Analysis
    He, Pinjia
    Zhu, Jieming
    He, Shilin
    Li, Jian
    Lyu, Michael R.
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (06) : 931 - 944
  • [8] Drain: An Online Log Parsing Approach with Fixed Depth Tree
    He, Pinjia
    Zhu, Jieming
    Zheng, Zibin
    Lyu, Michael R.
    [J]. 2017 IEEE 24TH INTERNATIONAL CONFERENCE ON WEB SERVICES (ICWS 2017), 2017, : 33 - 40
  • [9] Identifying Impactful Service System Problems via Log Analysis
    He, Shilin
    Lin, Qingwei
    Lou, Jian-Guang
    Zhang, Hongyu
    Lyu, Michael R.
    Zhang, Dongmei
    [J]. ESEC/FSE'18: PROCEEDINGS OF THE 2018 26TH ACM JOINT MEETING ON EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING, 2018, : 60 - 70
  • [10] Experience Report: System Log Analysis for Anomaly Detection
    He, Shilin
    Zhu, Jieming
    He, Pinjia
    Lyu, Michael R.
    [J]. 2016 IEEE 27TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE), 2016, : 207 - 218