Logformer: Cascaded Transformer for System Log Anomaly Detection

被引:2
|
作者
Hang, Feilu [1 ]
Guo, Wei [1 ]
Chen, Hexiong [1 ]
Xie, Linjiang [1 ]
Zhou, Chenghao [2 ]
Liu, Yao [2 ]
机构
[1] Yunnan Power Grid Co Ltd, Informat Ctr, Kunming 650034, Peoples R China
[2] Univ Elect Sci & Technol China, Network & Data Secur Key Lab Sichuan Prov, Chengdu 610054, Peoples R China
来源
基金
中国国家自然科学基金;
关键词
Anomaly detection; system logs; semi -structured data; pre -trained embedding; cascaded transformer;
D O I
10.32604/cmes.2023.025774
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Modern large-scale enterprise systems produce large volumes of logs that record detailed system runtime status and key events at key points. These logs are valuable for analyzing performance issues and understanding the status of the system. Anomaly detection plays an important role in service management and system maintenance, and guarantees the reliability and security of online systems. Logs are universal semi-structured data, which causes difficulties for traditional manual detection and pattern-matching algorithms. While some deep learning algorithms utilize neural networks to detect anomalies, these approaches have an over-reliance on manually designed features, resulting in the effectiveness of anomaly detection depending on the quality of the features. At the same time, the aforementioned methods ignore the underlying contextual information present in adjacent log entries. We propose a novel model called Logformer with two cascaded transformer-based heads to capture latent contextual information from adjacent log entries, and leverage pre-trained embeddings based on logs to improve the representation of the embedding space. The proposed model achieves comparable results on HDFS and BGL datasets in terms of metric accuracy, recall and F1-score. Moreover, the consistent rise in F1-score proves that the representation of the embedding space with pre-trained embeddings is closer to the semantic information of the log.
引用
收藏
页码:517 / 529
页数:13
相关论文
共 50 条
  • [21] Deep Block Transformer for Anomaly Detection
    Ishaq, Muhammad Yasir
    Yong, Zhou
    Xue, Shaxin
    Raza, Qamar
    An, Zhijian
    Amin, Muhammad Usama
    2024 4TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND ARTIFICIAL INTELLIGENCE, CCAI 2024, 2024, : 481 - 486
  • [22] Unsupervised Cross-system Log Anomaly Detection via Domain Adaptation
    Han, Xiao
    Yuan, Shuhan
    PROCEEDINGS OF THE 30TH ACM INTERNATIONAL CONFERENCE ON INFORMATION & KNOWLEDGE MANAGEMENT, CIKM 2021, 2021, : 3068 - 3072
  • [23] Anomaly Detection System Towards a framework for enterprise log management of security services
    Ozulku, Omer
    Fadhel, Nawfal F.
    Argles, David
    Wills, Gary B.
    2014 WORLD CONGRESS ON INTERNET SECURITY (WORLDCIS), 2014, : 97 - 102
  • [24] Recurrent Neural Network Attention Mechanisms for Interpretable System Log Anomaly Detection
    Brown, Andy
    Tuor, Aaron
    Hutchinson, Brian
    Nichols, Nicole
    PROCEEDINGS OF THE 1ST WORKSHOP ON MACHINE LEARNING FOR COMPUTING SYSTEMS (MLCS 2018), 2018,
  • [25] LogLS: Research on System Log Anomaly Detection Method Based on Dual LSTM
    Chen, Yiyong
    Luktarhan, Nurbol
    Lv, Dan
    SYMMETRY-BASEL, 2022, 14 (03):
  • [26] Lightweight Multi-Task Learning Method for System Log Anomaly Detection
    Pham, Tuan-Anh
    Lee, Jong-Hoon
    IEEE ACCESS, 2024, 12 : 147739 - 147752
  • [27] LAnoBERT: System log anomaly detection based on BERT masked language model
    Lee, Yukyung
    Kim, Jina
    Kang, Pilsung
    APPLIED SOFT COMPUTING, 2023, 146
  • [28] Toward a Log-based Anomaly Detection System for Cyber Range Platforms
    Blefari, Francesco
    Pironti, Francesco
    Furfaro, Angelo
    19TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY, ARES 2024, 2024,
  • [29] LogTracer: Efficient Anomaly Tracing Combining System Log Detection and Provenance Graph
    Niu, Weina
    Yu, Zhenqi
    Li, Zimu
    Li, Beibei
    Zhang, Runzi
    Zhang, Xiaosong
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 3356 - 3361
  • [30] Distributed Systems Anomaly Detection Based on Log
    Lai, Fenggang
    Zhang, Pan
    Cheng, Ruiying
    Xu, Peng
    2021 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES FOR DISASTER MANAGEMENT (ICT-DM), 2021, : 72 - 79