LogGAN: A Sequence-Based Generative Adversarial Network for Anomaly Detection Based on System Logs

被引:19
作者
Xia, Bin [1 ]
Yin, Junjie [1 ]
Xu, Jian [2 ]
Li, Yun [1 ]
机构
[1] Nanjing Univ Posts & Telecommun, Jiangsu Key Lab Big Data Secur & Intelligent Proc, Nanjing, Peoples R China
[2] Nanjing Univ Sci & Technol, Sch Comp Sci & Engn, Nanjing, Peoples R China
来源
SCIENCE OF CYBER SECURITY, SCISEC 2019 | 2019年 / 11933卷
基金
中国国家自然科学基金;
关键词
Anomaly detection; Generative adversarial network; Log-level anomaly; Negative sampling;
D O I
10.1007/978-3-030-34637-9_5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
System logs which trace system states and record valuable events comprise a significant component of any computer system in our daily life. There exist abundant information (i.e., normal and abnormal instances) involved in logs which assist administrators in diagnosing and maintaining the operation of the system. If diverse and complex anomalies (i.e., bugs and failures) cannot be detected and eliminated efficiently, the running workflows and transactions, even the system, would break down. Therefore, anomaly detection has become increasingly significant and attracted a lot of research attention. However, current approaches concentrate on the anomaly detection in a high-level granularity of logs (i.e., session) instead of detecting log-level anomalies which weakens the efficiency of responding anomalies and the diagnosis of system failures. To overcome the limitation, we propose a sequence-based generative adversarial network for anomaly detection based on system logs named LogGAN which detects log-level anomalies based on the patterns (i.e., the combination of latest logs). In addition, the generative adversarial network-based model relieves the effect of imbalance between normal and abnormal instances to improve the performance of capturing anomalies. To evaluate LogGAN, we conduct extensive experiments on two real-world datasets, and the experimental results show the effectiveness of our proposed approach to log-level anomaly detection.
引用
收藏
页码:61 / 76
页数:16
相关论文
共 21 条
[1]  
[Anonymous], 2018, INT C INFORM SCI APP
[2]  
Bodík P, 2010, EUROSYS'10: PROCEEDINGS OF THE EUROSYS 2010 CONFERENCE, P111
[3]   CFGAN: A Generic Collaborative Filtering Framework based on Generative Adversarial Networks [J].
Chae, Dong-Kyu ;
Kang, Jin-Soo ;
Kim, Sang-Wook ;
Lee, Jung-Tae .
CIKM'18: PROCEEDINGS OF THE 27TH ACM INTERNATIONAL CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT, 2018, :137-146
[4]   Anomaly Detection: A Survey [J].
Chandola, Varun ;
Banerjee, Arindam ;
Kumar, Vipin .
ACM COMPUTING SURVEYS, 2009, 41 (03)
[5]   SLOM: a new measure for local spatial outliers [J].
Chawla, S ;
Sun, P .
KNOWLEDGE AND INFORMATION SYSTEMS, 2006, 9 (04) :412-429
[6]   Failure diagnosis using decision trees [J].
Chen, M ;
Zheng, AX ;
Lloyd, J ;
Jordan, MI ;
Brewer, E .
INTERNATIONAL CONFERENCE ON AUTONOMIC COMPUTING, PROCEEDINGS, 2004, :36-43
[7]   DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning [J].
Du, Min ;
Li, Feifei ;
Zheng, Guineng ;
Srikumar, Vivek .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :1285-1298
[8]   Generative Adversarial Networks [J].
Goodfellow, Ian ;
Pouget-Abadie, Jean ;
Mirza, Mehdi ;
Xu, Bing ;
Warde-Farley, David ;
Ozair, Sherjil ;
Courville, Aaron ;
Bengio, Yoshua .
COMMUNICATIONS OF THE ACM, 2020, 63 (11) :139-144
[9]   FIU-Miner (a fast, integrated, and user-friendly system for data mining) and its applications [J].
Li, Tao ;
Zeng, Chunqiu ;
Zhou, Wubai ;
Xue, Wei ;
Huang, Yue ;
Liu, Zheng ;
Zhou, Qifeng ;
Xia, Bin ;
Wang, Qing ;
Wang, Wentao ;
Zhu, Xiaolong .
KNOWLEDGE AND INFORMATION SYSTEMS, 2017, 52 (02) :411-443
[10]   Failure prediction in IBM BlueGene/L event logs [J].
Liang, Yinglung ;
Zhang, Yanyong ;
Xiong, Hui ;
Sahoo, Ramendra .
ICDM 2007: PROCEEDINGS OF THE SEVENTH IEEE INTERNATIONAL CONFERENCE ON DATA MINING, 2007, :583-+