AutoLog: Anomaly detection by deep autoencoding of system logs

被引:43
作者
Catillo, Marta [1 ]
Pecchia, Antonio [1 ]
Villano, Umberto [1 ]
机构
[1] Univ Sannio, Benevento, Italy
关键词
System logs; Deep learning; Autoencoder; Anomaly detection; Cybersecurity; NETWORK;
D O I
10.1016/j.eswa.2021.116263
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The use of system logs for detecting and troubleshooting anomalies of production systems has been known since the early days of computers. In spite of the advances in the area, the analysis of log files emitted by real-life systems poses many peculiar challenges. Up-to-date tools, such as log management and Security Information and Event Management (SIEM) products, capitalize on standard data formats, logging protocols and dictionaries of threat signatures, which hardly fit to logs of industrial and proprietary systems. This paper addresses the analysis of logs emitted by computer systems with a focus on anomaly detection. The proposed approach, named AutoLog, consists in sampling the logs at regular intervals and to compute numeric scores. Scores collected under normative operations are used to train a semi-supervised deep autoencoder, which serves as a baseline to classify future scores. The approach is not constrained by the structure of underlying logs and does not need for anomalies at training time. The results obtained in detecting anomalies of two industrial systems and the public BG/L and Hadoop datasets widely used as benchmarks, indicate that the recall of AutoLog ranges between 0.96 and 0.99, while the precision is within 0.93 and 0.98. A comparative study with isolation forest, one-class SVM, decision tree, vanilla autoencoder and variational autoencoder is conducted to demonstrate the validity of the proposal.
引用
收藏
页数:21
相关论文
共 71 条
[1]  
Almotiri J, 2017, 2017 IEEE LONG ISLAND SYSTEMS, APPLICATIONS AND TECHNOLOGY CONFERENCE (LISAT)
[2]  
[Anonymous], 1992, DIGEST PAPERS FTCS 2
[3]  
[Anonymous], 2019, INT JOINT C ART INT
[4]  
[Anonymous], 2002, 2002 ACMIEEE C SUPER, P1, DOI DOI 10.1109/SC.2002.10017
[5]  
[Anonymous], 2013, Lecture Notes in Computer Science,, DOI [DOI 10.1007/978-3-642-41822-815, DOI 10.1007/978-3-642-41822-8]
[6]  
Aygun R. Can, 2017, 2017 IEEE 4th International Conference on Cyber-Security and Cloud Computing (CSCloud), P193, DOI 10.1109/CSCloud.2017.39
[7]   Experience Report: Log Mining using Natural Language Processing and Application to Anomaly Detection [J].
Bertero, Christophe ;
Roy, Matthieu ;
Sauvanaud, Carla ;
Tredan, Gilles .
2017 IEEE 28TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE), 2017, :351-360
[8]   The Operational Role of Security Information and Event Management Systems [J].
Bhatt, Sandeep ;
Manadhata, Pratyusa K. ;
Zomlot, Loai .
IEEE SECURITY & PRIVACY, 2014, 12 (05) :35-41
[9]   Exploratory Study of Machine Learning Techniques for Supporting Failure Prediction [J].
Campos, Joao R. ;
Vieira, Marco ;
Costa, Ernesto .
2018 14TH EUROPEAN DEPENDABLE COMPUTING CONFERENCE (EDCC 2018), 2018, :9-16
[10]  
Carrington A.M., 2021, IEEE T PATTERN ANAL