LogSpy: System Log Anomaly Detection for Distributed Systems

被引:6
|
作者
Li, Haoming [1 ]
Li, Yuguo [2 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Comp Sci, Beijing, Peoples R China
[2] Beijing Univ Posts & Telecommun, Int Sch, Beijing, Peoples R China
关键词
AIOps; anomaly detection; attention mechanism; CNN; distributed systems;
D O I
10.1109/ICAICE51518.2020.00073
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Log analysis is an important part of distributed system management. System log records the running status of the system and contains a lot of important and valuable information. This paper proposes an anomaly detection method, LogSpy, for distributed systems. It uses the combination of natural language processing technology and clustering algorithm for log template mining and feature extraction. In anomaly detection, it is found that there are a large number of remote calls in the distributed systems and traditional CNN has certain limitations on this small amount of negative sample data. LogSpy introduces the attention mechanism in detection algorithm and optimizes the detection window and computational complexity. Experiments conducted on the OpenStack test platform show that LogSpy can perform excellent anomaly detection on distributed systems compared to traditional anomaly detection methods.
引用
收藏
页码:347 / 352
页数:6
相关论文
共 50 条
  • [41] LogLS: Research on System Log Anomaly Detection Method Based on Dual LSTM
    Chen, Yiyong
    Luktarhan, Nurbol
    Lv, Dan
    SYMMETRY-BASEL, 2022, 14 (03):
  • [42] Lightweight Multi-Task Learning Method for System Log Anomaly Detection
    Pham, Tuan-Anh
    Lee, Jong-Hoon
    IEEE ACCESS, 2024, 12 : 147739 - 147752
  • [43] LAnoBERT: System log anomaly detection based on BERT masked language model
    Lee, Yukyung
    Kim, Jina
    Kang, Pilsung
    APPLIED SOFT COMPUTING, 2023, 146
  • [44] Toward a Log-based Anomaly Detection System for Cyber Range Platforms
    Blefari, Francesco
    Pironti, Francesco
    Furfaro, Angelo
    19TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY, ARES 2024, 2024,
  • [45] LogTracer: Efficient Anomaly Tracing Combining System Log Detection and Provenance Graph
    Niu, Weina
    Yu, Zhenqi
    Li, Zimu
    Li, Beibei
    Zhang, Runzi
    Zhang, Xiaosong
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 3356 - 3361
  • [46] Anomaly detection for distributed system based on measurement attributes analysis
    Zhang, Le-Jun
    Guo, Lin
    Zhang, Jian-Pei
    Yang, Jing
    Xia, Lei
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2013, 36 (06): : 69 - 73
  • [47] Connectionist model for distributed adaptive network anomaly detection system
    Pasha, MF
    Budiarto, R
    Syukur, M
    PROCEEDINGS OF 2005 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-9, 2005, : 3915 - 3920
  • [48] Distributed Internal Anomaly Detection System for Internet-of-Things
    Thanigaivelan, Nanda Kumar
    Nigussie, Ethiopia
    Kanth, Rajeev Kumar
    Virtanen, Seppo
    Isoaho, Jouni
    2016 13TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2016,
  • [49] A Generative Adversarial Networks for Log Anomaly Detection
    Duan, Xiaoyu
    Ying, Shi
    Yuan, Wanli
    Cheng, Hailong
    Yin, Xiang
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2021, 37 (01): : 135 - 148
  • [50] Substructure-aware Log Anomaly Detection
    Tang, Yanni
    Zhang, Zhuoxing
    Zhao, Kaiqi
    Fang, Lanting
    Li, Zhenhua
    Chen, Wu
    PROCEEDINGS OF THE VLDB ENDOWMENT, 2024, 18 (02): : 213 - 225