Semi-supervised Log-based Anomaly Detection via Probabilistic Label Estimation

被引:115
作者
Yang, Lin [1 ]
Chen, Junjie [1 ]
Wang, Zan [1 ]
Wang, Weijing [1 ]
Jiang, Jiajun [1 ]
Dong, Xuyuan [2 ]
Zhang, Wenbin [2 ]
机构
[1] Tianjin Univ, Coll Intelligence & Comp, Tianjin, Peoples R China
[2] Tianjin Univ, Informat & Network Ctr, Tianjin, Peoples R China
来源
2021 IEEE/ACM 43RD INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2021) | 2021年
基金
中国国家自然科学基金;
关键词
Log Analysis; Anomaly Detection; Deep Learning; Probabilistic Estimation; Label;
D O I
10.1109/ICSE43902.2021.00130
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
With the growth of software systems, logs have become an important data to aid system maintenance. Log-based anomaly detection is one of the most important methods for such purpose, which aims to automatically detect system anomalies via log analysis. However, existing log-based anomaly detection approaches still suffer from practical issues due to either depending on a large amount of manually labeled training data (supervised approaches) or unsatisfactory performance without learning the knowledge on historical anomalies (unsupervised and semi-supervised approaches). In this paper, we propose a novel practical log-based anomaly detection approach, PLELog, which is semi-supervised to get rid of time-consuming manual labeling and incorporates the knowledge on historical anomalies via probabilistic label estimation to bring supervised approaches' superiority into play. In addition, PLELog is able to stay immune to unstable log data via semantic embedding and detect anomalies efficiently and effectively by designing an attention-based (MU neural network. We evaluated PLELog on two most widely-used public datasets, and the results demonstrate the effectiveness of PLELog, significantly outperforming the compared approaches with an average of 181.6% improvement in terms of F1-score. In particular, PLELog has been applied to two real-world systems from our university and a large corporation, further demonstrating its practicability.
引用
收藏
页码:1448 / 1460
页数:13
相关论文
共 59 条
[1]   Using Finite-State Models for Log Differencing [J].
Amar, Hen ;
Bao, Lingfeng ;
Busany, Nimrod ;
Lo, David ;
Maoz, Shahar .
ESEC/FSE'18: PROCEEDINGS OF THE 2018 26TH ACM JOINT MEETING ON EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING, 2018, :49-59
[2]  
[Anonymous], 2019, INT JOINT C ART INT
[3]  
[Anonymous], 2017, SYNTHESIS LECT INFOR
[4]  
[Anonymous], 2017, The Journal of Open Source Software, DOI DOI 10.21105/JOSS.00205
[5]  
[Anonymous], 2010, ICML OMNIPRESS
[6]   Maximizing entropy over Markov processes [J].
Biondi, Fabrizio ;
Legay, Axel ;
Nielsen, Bo Friis ;
Wasowski, Andrzej .
JOURNAL OF LOGICAL AND ALGEBRAIC METHODS IN PROGRAMMING, 2014, 83 (5-6) :384-399
[7]  
Candido M. F, 2019, ABS191205878 CORR ABS191205878 CORR
[8]  
Chen J., ACM T SOFTWARE ENG M
[9]   How Incidental are the Incidents? Characterizing and Prioritizing Incidents for Large-Scale Online Service Systems [J].
Chen, Junjie ;
Zhang, Shu ;
He, Xiaoting ;
Lin, Qingwei ;
Zhang, Hongyu ;
Hao, Dan ;
Kang, Yu ;
Gao, Feng ;
Xu, Zhangwei ;
Dang, Yingnong ;
Zhang, Dongmei .
2020 35TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE 2020), 2020, :373-384
[10]   Continuous Incident Triage for Large-Scale Online Service Systems [J].
Chen, Junjie ;
He, Xiaoting ;
Lin, Qingwei ;
Zhang, Hongyu ;
Hao, Dan ;
Gao, Feng ;
Xu, Zhangwei ;
Dang, Yingnong ;
Zhang, Dongmei .
34TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE 2019), 2019, :364-375