LogLG: Weakly Supervised Log Anomaly Detection via Log-Event Graph Construction
نویسندگان
چکیده
Fully supervised log anomaly detection methods suffer the heavy burden of annotating massive unlabeled data. Recently, many semi-supervised have been proposed to reduce annotation costs with help parsed templates. However, these consider each keyword independently, which disregards correlation between keywords and contextual relationships among sequences. In this paper, we propose a novel weakly framework, named LogLG, explore semantic connections from Specifically, design an end-to-end iterative process, where logs are first extracted construct log-event graph. Then, build subgraph annotator generate pseudo labels for To ameliorate quality, adopt self-supervised task pre-train annotator. After that, model is trained generated labels. Conditioned on classification results, re-extract sequences update graph next iteration. Experiments five benchmarks validate effectiveness LogLG detecting anomalies data demonstrate that as state-of-the-art method, achieves significant performance improvements compared existing methods.
منابع مشابه
Log File Anomaly Detection
Analysis of log files pertaining to a failed run can be a tedious task, especially if the file runs into thousands of lines. Using the recent development in text analysis using deep neural networks, we present a method to reduce effort needed to analyze the log file by highlighting the most probably useful text in the failed log file, which can assist in debugging the causes of the failure. In ...
متن کاملAnomaly Detection in Log Records
Received Jan 2, 2018 Revised Mar 9, 2018 Accepted Mar 24, 2018 In recent times complex software systems are continuously generating application and server logs for the events which had occurred in the past. These generated logs can be utilized for anomaly and intrusion detection. These log files can be used for detecting certain types of abnormalities or exceptions such as spikes in HTTP reques...
متن کاملComputer Log Anomaly Detection Using Frequent Episodes
In this paper, we propose a set of algorithms to automate the detection of anomalous frequent episodes. The algorithms make use of the hierarchy and frequency of episodes present in an examined sequence of log data and in a history preceding it. The algorithms identify changes in a set of frequent episodes and their frequencies. We evaluate the algorithms and describe tests made using live comp...
متن کاملAnomaly Detection in Log Data using Graph Databases and Machine Learning to Defend Advanced Persistent Threats
Advanced Persistent Threats (APTs) are a main impendence in cyber security of computer networks. In 2015, a successful breach remains undetected 146 days on average, reported by [Fi16]. With our work we demonstrate a feasible and fast way to analyse real world log data to detect breaches or breach attempts. By adapting well-known kill chain mechanisms and a combine of a time series database and...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Lecture Notes in Computer Science
سال: 2023
ISSN: ['1611-3349', '0302-9743']
DOI: https://doi.org/10.1007/978-3-031-30678-5_36