An automated approach for abstracting execution logs to execution events

被引:59
作者
Jiang, Zhen Ming [1 ]
Hassan, Ahmed E. [1 ]
Hamann, Gilbert [2 ]
Flora, Parminder [2 ]
机构
[1] Queens Univ, Sch Comp, Kingston, ON, Canada
[2] RIM, Enterprise Performance Engn, Waterloo, ON, Canada
来源
JOURNAL OF SOFTWARE MAINTENANCE AND EVOLUTION-RESEARCH AND PRACTICE | 2008年 / 20卷 / 04期
关键词
execution logs; dynamic analysis; clone detection;
D O I
10.1002/smr.374
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Execution logs are generated by output statements that developers insert into the source code. Execution logs are widely available and are helpful in monitoring, remote issue resolution, and system understanding of complex enterprise applications. There are many proposals for standardized log formats such as the W3C and SNMP formats. However, most applications use ad hoc non-standardized logging formats. Automated analysis of such logs is complex due to the loosely defined structure and a large non-fixed vocabulary of words. The large volume of logs, produced by enterprise applications, limits the usefulness of manual analysis techniques. Automated techniques are needed to uncover the structure of execution logs. Using the uncovered structure, sophisticated analysis of logs call be performed. In this paper, we propose a log abstraction technique that recognizes the internal structure of each log line. Using the recovered structure, log lines call he easily summarized and categorized to help comprehend and investigate the complex behavior of large software applications. Our proposed approach handles free-form log lines with minimal requirements on the format of a log line. Through a case study using log files from four enterprise applications, we demonstrate that our approach abstracts log files of different complexities with high precision and recall. Copyright (C) 2008 John Wiley & Sons, Ltd.
引用
收藏
页码:249 / 267
页数:19
相关论文
共 28 条
[1]  
[Anonymous], ARTIFICIAL INTELLIGE
[2]  
[Anonymous], 2000, HDB NATURAL LANGUAGE
[3]   Clone detection using abstract syntax trees [J].
Baxter, ID ;
Yahin, A ;
Moura, L ;
Sant'Anna, M ;
Bier, L .
INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE, PROCEEDINGS, 1998, :368-377
[4]  
Cordy JR, 2003, PROG COMPREHEN, P196
[5]   Using extended logic programming for alarm-correlation in cellular phone networks [J].
Damásio, CV ;
Fröhlich, P ;
Nejdl, W ;
Pereira, LM ;
Schroeder, M .
APPLIED INTELLIGENCE, 2002, 17 (02) :187-202
[6]   A bibliographical study of grammatical inference [J].
de la Higuera, C .
PATTERN RECOGNITION, 2005, 38 (09) :1332-1348
[7]  
DUCASSE S, 1999, ICSM, P109
[8]  
Gupta M, 1999, PROCEEDINGS OF THE WORKSHOP ON INTRUSION DETECTION AND NETWORK MONITORING (ID '99), P93
[9]  
Hansen S.E., 1993, LISA 93 P 7 USENIX C, P145
[10]  
Huard J.-F., 1996, Fault isolation based on decision-theoretic troubleshooting