Distributed system anomaly detection using deep learning-based log analysis

被引:4
作者
Han, Pengfei [1 ]
Li, Huakang [2 ]
Xue, Gang [1 ]
Zhang, Chao [1 ]
机构
[1] Yunnan Univ, Sch Software, Kunming, Yunnan, Peoples R China
[2] Xian Jiaotong Liverpool Univ, Sch Artificial Intelligence & Adv Comp, Suzhou, Jiangsu, Peoples R China
关键词
deep learning; distributed system; spatiotemporal feature extraction; system anomaly detection; system logs analysis;
D O I
10.1111/coin.12573
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Anomaly detection is a key step in ensuring the security and reliability of large-scale distributed systems. Analyzing system logs through artificial intelligence methods can quickly detect anomalies and thus help maintenance personnel to maintain system security. Most of the current works only focus on the temporal or spatial features of distributed system logs, and they cannot sufficiently extract the global features of distributed system logs to achieve a good correct rate of anomaly detection. To further address the shortcomings of existing methods, this paper proposes a deep learning model with global spatiotemporal features to detect the presence of anomalies in distributed system logs. First, we extract semi-structured log events from log templates and model them as natural language. In addition, we focus on the temporal characteristics of logs using the bidirectional long short-term memory network and the spatial invocation characteristics of logs using the Transformer. Extensive experimental evaluations show the advantages of our proposed model for distributed system log anomaly detection tasks. The optimal F1-Score on three open-source datasets and our own collected distributed system datasets reach 98.04%, 94.34%, 88.16%, and 97.40%, respectively.
引用
收藏
页码:433 / 455
页数:23
相关论文
共 41 条
[1]   Logan: A Distributed Online Log Parser [J].
Agrawal, Amey ;
Karlupia, Rohit ;
Gupta, Rajat .
2019 IEEE 35TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2019), 2019, :1946-1951
[2]  
Aksu D, 2018, 2018 INTERNATIONAL CONGRESS ON BIG DATA, DEEP LEARNING AND FIGHTING CYBER TERRORISM (IBIGDELFT), P77, DOI 10.1109/IBIGDELFT.2018.8625370
[3]  
Beutel D. J., 2020, Flower: A Friendly Federated Learning Research Framework
[4]  
Bottou L., 2012, Neural networks: Tricks of the trade, P421
[5]   DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning [J].
Du, Min ;
Li, Feifei ;
Zheng, Guineng ;
Srikumar, Vivek .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :1285-1298
[6]  
Du M, 2016, IEEE DATA MINING, P859, DOI [10.1109/ICDM.2016.0103, 10.1109/ICDM.2016.160]
[7]  
Du S., 2015, 2015 INT C BEH EC SO, P188
[8]  
Eskin E., 2000, Anomaly detection over noisy data using learned probability distributions
[9]   Unsupervised log message anomaly detection [J].
Farzad, Amir ;
Gulliver, T. Aaron .
ICT EXPRESS, 2020, 6 (03) :229-237
[10]  
George V., 2013, INT J ADV RES COMPUT, V4, P34