A Comprehensive Review of Anomaly Detection in Web Logs

M Majd, P Najafi, SA Alhosseini… - 2022 IEEE/ACM …, 2022 - ieeexplore.ieee.org
Anomaly detection is a significant problem that has been researched within diverse research
areas and application domains, especially in the area of web-based internet services or …

Log anomaly detection by adversarial autoencoders with graph feature fusion

Y Xie, K Yang - IEEE Transactions on Reliability, 2023 - ieeexplore.ieee.org
The exponential growth of scale and complexity in distributed systems necessitates
significant maintenance efforts. Logs play an indispensable role in system operation and …

Detection and quantification of anomalies in communication networks based on LSTM-ARIMA combined model

S Xue, H Chen, X Zheng - International Journal of Machine Learning and …, 2022 - Springer
The anomaly detection for communication networks is significant for improve the quality of
communication services and network reliability. However, traditional communication …

Landscape and Taxonomy of Online Parser-Supported Log Anomaly Detection Methods

S Lupton, H Washizaki, N Yoshioka… - IEEE Access, 2024 - ieeexplore.ieee.org
As production system estates become larger and more complex, ensuring stability through
traditional monitoring approaches becomes more challenging. Rule-based monitoring is …

Detecting log anomaly using subword attention encoder and probabilistic feature selection

M Hariharan, A Mishra, S Ravi, A Sharma, A Tanwar… - Applied …, 2023 - Springer
Log anomaly is a manifestation of a software system error or security threat. Detecting such
unusual behaviours across logs in real-time is the driving force behind large-scale …

Architecting a big data-driven software architecture for smart street lighting

M Ali, P Scandurra, F Moretti… - 2023 IEEE 20th …, 2023 - ieeexplore.ieee.org
Big data is one of the enabling technologies of the vision of Industry 4.0. Technological
evolution is able to generate an increasing number of data. From the web, to social …

Threshold based technique to detect anomalies using log files

T David Akande, B Kaur, S Dadkhah… - Proceedings of the 2022 …, 2022 - dl.acm.org
Every action carried out on computer systems can be captured using log files. Proper
scanning of log files can divulge security breaches. However, a large-scale data processing …

Log File Analysis Based on Machine Learning: A Survey: Survey

RR Abdalla, AK Jumaa - UHD Journal of Science and …, 2022 - journals.uhd.edu.iq
In the past few years, software monitoring and log analysis become very interesting topics
because it supports developers during software developing, identify problems with software …

Univariate Time Series Anomaly Detection Based on Hierarchical Attention Network

Z Chen, D Jia, Y Sun, L Yang, W Jin… - Tsinghua Science and …, 2024 - ieeexplore.ieee.org
In order to support the perception and defense of the operation risk of the medium and low
voltage distribution system, it is crucial to conduct data mining on the time series generated …

Condition monitoring and anomaly detection in cyber-physical systems

W Marfo, DK Tosh, SV Moore - 2022 17th Annual System of …, 2022 - ieeexplore.ieee.org
The modern industrial environment is equipping myriads of smart manufacturing machines
where the state of each device can be monitored continuously. Such monitoring can help …