LogLG: Weakly Supervised Log Anomaly Detection via Log-Event Graph Construction

نویسندگان

چکیده

Fully supervised log anomaly detection methods suffer the heavy burden of annotating massive unlabeled data. Recently, many semi-supervised have been proposed to reduce annotation costs with help parsed templates. However, these consider each keyword independently, which disregards correlation between keywords and contextual relationships among sequences. In this paper, we propose a novel weakly framework, named LogLG, explore semantic connections from Specifically, design an end-to-end iterative process, where logs are first extracted construct log-event graph. Then, build subgraph annotator generate pseudo labels for To ameliorate quality, adopt self-supervised task pre-train annotator. After that, model is trained generated labels. Conditioned on classification results, re-extract sequences update graph next iteration. Experiments five benchmarks validate effectiveness LogLG detecting anomalies data demonstrate that as state-of-the-art method, achieves significant performance improvements compared existing methods.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Log File Anomaly Detection

Analysis of log files pertaining to a failed run can be a tedious task, especially if the file runs into thousands of lines. Using the recent development in text analysis using deep neural networks, we present a method to reduce effort needed to analyze the log file by highlighting the most probably useful text in the failed log file, which can assist in debugging the causes of the failure. In ...

متن کامل

Anomaly Detection in Log Records

Received Jan 2, 2018 Revised Mar 9, 2018 Accepted Mar 24, 2018 In recent times complex software systems are continuously generating application and server logs for the events which had occurred in the past. These generated logs can be utilized for anomaly and intrusion detection. These log files can be used for detecting certain types of abnormalities or exceptions such as spikes in HTTP reques...

متن کامل

Computer Log Anomaly Detection Using Frequent Episodes

In this paper, we propose a set of algorithms to automate the detection of anomalous frequent episodes. The algorithms make use of the hierarchy and frequency of episodes present in an examined sequence of log data and in a history preceding it. The algorithms identify changes in a set of frequent episodes and their frequencies. We evaluate the algorithms and describe tests made using live comp...

متن کامل

Anomaly Detection in Log Data using Graph Databases and Machine Learning to Defend Advanced Persistent Threats

Advanced Persistent Threats (APTs) are a main impendence in cyber security of computer networks. In 2015, a successful breach remains undetected 146 days on average, reported by [Fi16]. With our work we demonstrate a feasible and fast way to analyse real world log data to detect breaches or breach attempts. By adapting well-known kill chain mechanisms and a combine of a time series database and...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Lecture Notes in Computer Science

سال: 2023

ISSN: ['1611-3349', '0302-9743']

DOI: https://doi.org/10.1007/978-3-031-30678-5_36