Discovering Hidden Errors from Application Log Traces with Process Mining

被引:2
作者
Cinque, Marcello [1 ]
Della Corte, Raffaele [1 ]
Pecchia, Antonio [1 ]
机构
[1] Univ Napoli Federico II, Dipartimento Ingn Elettr & Tecnol Informaz, Via Claudio 21, I-80125 Naples, Italy
来源
2019 15TH EUROPEAN DEPENDABLE COMPUTING CONFERENCE (EDCC 2019) | 2019年
关键词
process mining; application log; trace; software errors; testing;
D O I
10.1109/EDCC.2019.00034
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Over the past decades logs have been widely used for detecting and analyzing failures of computer applications. Nevertheless, it is widely accepted by the scientific community that failures might go undetected in the logs. This paper proposes a measurement study with a dataset of 3,794 log traces obtained from normative and failure runs of the Apache web server. We use process mining (i) to infer a model of the normative log behavior, e.g., presence and ordering of messages in the traces, and (ii) to detect failures within arbitrary traces by looking for deviations from the model (conformance checking). Analysis is done with the Integer Linear Programming (ILP) Miner, Inductive Miner and Alpha++ Miner algorithms. Our measurements indicate that, although only around 18% failure traces contain explicit error keywords and phrases, conformance checking allows detecting up to 87% failures at high precision, which means that most of the errors are hidden across the traces.
引用
收藏
页码:137 / 140
页数:4
相关论文
共 12 条
[1]  
[Anonymous], 2016, IEEE Std, P1, DOI [10.1109/IEEESTD.2016.7740858, DOI 10.1109/IEEESTD.2016.7740858, 10.1109/IEEESTD.2016.7520635]
[2]   Characterizing Direct Monitoring Techniques in Software Systems [J].
Cinque, Marcello ;
Cotroneo, Domenico ;
Della Corte, Raffaele ;
Pecchia, Antonio .
IEEE TRANSACTIONS ON RELIABILITY, 2016, 65 (04) :1665-1681
[3]   Automated root cause identification of security alerts: Evaluation in a SaaS Cloud [J].
Cotroneo, Domenico ;
Paudice, Andrea ;
Pecchia, Antonio .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 56 :375-387
[4]   Emulation of software faults: A field data study and a practical approach [J].
Duraes, Joao A. ;
Madeira, Henrique S. .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2006, 32 (11) :849-867
[5]  
Kalyanakrishnam M., 1999, Proceedings of the 18th IEEE Symposium on Reliable Distributed Systems, P178, DOI 10.1109/RELDIS.1999.805094
[6]  
Leemans Sander J. J., 2013, Application and Theory of Petri Nets and Concurrency. 34th International Conference, PETRI NETS 2013. Proceedings: LNCS 7927, P311, DOI 10.1007/978-3-642-38697-8_17
[7]   On Fault Representativeness of Software Fault Injection [J].
Natella, Roberto ;
Cotroneo, Domenico ;
Duraes, Joao A. ;
Madeira, Henrique S. .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2013, 39 (01) :80-96
[8]   Advances and Challenges in Log Analysis [J].
Oliner, Adam ;
Ganapathi, Archana ;
Xu, Wei .
COMMUNICATIONS OF THE ACM, 2012, 55 (02) :63-69
[9]   What supercomputers say: A study of five system logs [J].
Oliner, Adam ;
Stearley, Jon .
37TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2007, :575-+
[10]  
van der Werf JMEM, 2008, LECT NOTES COMPUT SC, V5062, P368, DOI 10.1007/978-3-540-68746-7_24