A survey on automated log analysis for reliability engineering

S He, P He, Z Chen, T Yang, Y Su, MR Lyu - ACM computing surveys …, 2021 - dl.acm.org
Logs are semi-structured text generated by logging statements in software source code. In
recent decades, software logs have become imperative in the reliability assurance …

Large language models for forecasting and anomaly detection: A systematic literature review

J Su, C Jiang, X Jin, Y Qiao, T Xiao, H Ma… - arXiv preprint arXiv …, 2024 - arxiv.org
This systematic literature review comprehensively examines the application of Large
Language Models (LLMs) in forecasting and anomaly detection, highlighting the current …

Log-based anomaly detection with deep learning: How far are we?

VH Le, H Zhang - Proceedings of the 44th international conference on …, 2022 - dl.acm.org
Software-intensive systems produce logs for troubleshooting purposes. Recently, many
deep learning models have been proposed to automatically detect system anomalies based …

Logbert: Log anomaly detection via bert

H Guo, S Yuan, X Wu - 2021 international joint conference on …, 2021 - ieeexplore.ieee.org
Detecting anomalous events in online computer systems is crucial to protect the systems
from malicious attacks or malfunctions. System logs, which record detailed information of …

Log-based anomaly detection without log parsing

VH Le, H Zhang - … 36th IEEE/ACM International Conference on …, 2021 - ieeexplore.ieee.org
Software systems often record important runtime information in system logs for
troubleshooting purposes. There have been many studies that use log data to construct …

Semi-supervised log-based anomaly detection via probabilistic label estimation

L Yang, J Chen, Z Wang, W Wang… - 2021 IEEE/ACM …, 2021 - ieeexplore.ieee.org
With the growth of software systems, logs have become an important data to aid system
maintenance. Log-based anomaly detection is one of the most important methods for such …

Robust log-based anomaly detection on unstable log data

X Zhang, Y Xu, Q Lin, B Qiao, H Zhang… - Proceedings of the …, 2019 - dl.acm.org
Logs are widely used by large and complex software-intensive systems for troubleshooting.
There have been a lot of studies on log-based anomaly detection. To detect the anomalies …

Tools and benchmarks for automated log parsing

J Zhu, S He, J Liu, P He, Q Xie… - 2019 IEEE/ACM 41st …, 2019 - ieeexplore.ieee.org
Logs are imperative in the development and maintenance process of many software
systems. They record detailed runtime information that allows developers and support …

Drain: An online log parsing approach with fixed depth tree

P He, J Zhu, Z Zheng, MR Lyu - 2017 IEEE international …, 2017 - ieeexplore.ieee.org
Logs, which record valuable system runtime information, have been widely employed in
Web service management by service providers and users. A typical log analysis based Web …

Hitanomaly: Hierarchical transformers for anomaly detection in system log

S Huang, Y Liu, C Fung, R He, Y Zhao… - IEEE transactions on …, 2020 - ieeexplore.ieee.org
Enterprise systems often produce a large volume of logs to record runtime status and events.
Anomaly detection from system logs is crucial for service management and system …