Cargando…
ConAnomaly: Content-Based Anomaly Detection for System Logs
Enterprise systems typically produce a large number of logs to record runtime states and important events. Log anomaly detection is efficient for business management and system maintenance. Most existing log-based anomaly detection methods use log parser to get log event indexes or event templates a...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2021
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8470903/ https://www.ncbi.nlm.nih.gov/pubmed/34577332 http://dx.doi.org/10.3390/s21186125 |
_version_ | 1784574319296249856 |
---|---|
author | Lv, Dan Luktarhan, Nurbol Chen, Yiyong |
author_facet | Lv, Dan Luktarhan, Nurbol Chen, Yiyong |
author_sort | Lv, Dan |
collection | PubMed |
description | Enterprise systems typically produce a large number of logs to record runtime states and important events. Log anomaly detection is efficient for business management and system maintenance. Most existing log-based anomaly detection methods use log parser to get log event indexes or event templates and then utilize machine learning methods to detect anomalies. However, these methods cannot handle unknown log types and do not take advantage of the log semantic information. In this article, we propose ConAnomaly, a log-based anomaly detection model composed of a log sequence encoder (log2vec) and multi-layer Long Short Term Memory Network (LSTM). We designed log2vec based on the Word2vec model, which first vectorized the words in the log content, then deleted the invalid words through part of speech tagging, and finally obtained the sequence vector by the weighted average method. In this way, ConAnomaly not only captures semantic information in the log but also leverages log sequential relationships. We evaluate our proposed approach on two log datasets. Our experimental results show that ConAnomaly has good stability and can deal with unseen log types to a certain extent, and it provides better performance than most log-based anomaly detection methods. |
format | Online Article Text |
id | pubmed-8470903 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2021 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-84709032021-09-27 ConAnomaly: Content-Based Anomaly Detection for System Logs Lv, Dan Luktarhan, Nurbol Chen, Yiyong Sensors (Basel) Article Enterprise systems typically produce a large number of logs to record runtime states and important events. Log anomaly detection is efficient for business management and system maintenance. Most existing log-based anomaly detection methods use log parser to get log event indexes or event templates and then utilize machine learning methods to detect anomalies. However, these methods cannot handle unknown log types and do not take advantage of the log semantic information. In this article, we propose ConAnomaly, a log-based anomaly detection model composed of a log sequence encoder (log2vec) and multi-layer Long Short Term Memory Network (LSTM). We designed log2vec based on the Word2vec model, which first vectorized the words in the log content, then deleted the invalid words through part of speech tagging, and finally obtained the sequence vector by the weighted average method. In this way, ConAnomaly not only captures semantic information in the log but also leverages log sequential relationships. We evaluate our proposed approach on two log datasets. Our experimental results show that ConAnomaly has good stability and can deal with unseen log types to a certain extent, and it provides better performance than most log-based anomaly detection methods. MDPI 2021-09-13 /pmc/articles/PMC8470903/ /pubmed/34577332 http://dx.doi.org/10.3390/s21186125 Text en © 2021 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Lv, Dan Luktarhan, Nurbol Chen, Yiyong ConAnomaly: Content-Based Anomaly Detection for System Logs |
title | ConAnomaly: Content-Based Anomaly Detection for System Logs |
title_full | ConAnomaly: Content-Based Anomaly Detection for System Logs |
title_fullStr | ConAnomaly: Content-Based Anomaly Detection for System Logs |
title_full_unstemmed | ConAnomaly: Content-Based Anomaly Detection for System Logs |
title_short | ConAnomaly: Content-Based Anomaly Detection for System Logs |
title_sort | conanomaly: content-based anomaly detection for system logs |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8470903/ https://www.ncbi.nlm.nih.gov/pubmed/34577332 http://dx.doi.org/10.3390/s21186125 |
work_keys_str_mv | AT lvdan conanomalycontentbasedanomalydetectionforsystemlogs AT luktarhannurbol conanomalycontentbasedanomalydetectionforsystemlogs AT chenyiyong conanomalycontentbasedanomalydetectionforsystemlogs |