Landscape of automated log analysis: A systematic literature review and mapping study

Ł Korzeniowski, K Goczyła - IEEE Access, 2022 - ieeexplore.ieee.org
Logging is a common practice in software engineering to provide insights into working
systems. The main uses of log files have always been failure identification and root cause …

[PDF][PDF] Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation.

D Han, Z Wang, W Chen, K Wang, R Yu, S Wang… - NDSS, 2023 - ndss-symposium.org
Concept drift is one of the most frustrating challenges for learning-based security
applications built on the closeworld assumption of identical distribution between training and …

On the effectiveness of log representation for log-based anomaly detection

X Wu, H Li, F Khomh - Empirical Software Engineering, 2023 - Springer
Logs are an essential source of information for people to understand the running status of a
software system. Due to the evolving modern software architecture and maintenance …

Logstamp: Automatic online log parsing based on sequence labelling

S Tao, W Meng, Y Cheng, Y Zhu, Y Liu, C Du… - ACM SIGMETRICS …, 2022 - dl.acm.org
Logs are one of the most critical data for service management. It contains rich runtime
information for both services and users. Since size of logs are often enormous in size and …

Literature review on log anomaly detection approaches utilizing online parsing methodology

S Lupton, H Washizaki, N Yoshioka… - 2021 28th Asia …, 2021 - ieeexplore.ieee.org
The use of anomaly detection for log monitoring requires parsing model input features from
raw, unstructured data. Log parsing methods come in many forms, but are generally …

Putracead: Trace anomaly detection with partial labels based on GNN and Pu Learning

K Zhang, C Zhang, X Peng… - 2022 IEEE 33rd …, 2022 - ieeexplore.ieee.org
Distributed tracing has been an important part of microservice infrastructure and learning-
based trace analysis has been used to detect anomalies in microservice systems. Existing …

EvLog: Identifying Anomalous Logs over Software Evolution

Y Huo, C Lee, Y Su, S Shan, J Liu… - 2023 IEEE 34th …, 2023 - ieeexplore.ieee.org
Software logs record system activities, aiding maintainers in identifying the underlying
causes for failures and enabling prompt mitigation actions. However, maintainers need to …

LogGraph: Log Event Graph Learning Aided Robust Fine-Grained Anomaly Diagnosis

J Li, H He, S Chen, D Jin - IEEE Transactions on Dependable …, 2023 - ieeexplore.ieee.org
Anomaly diagnosis relying on system logs to record runtime events is essential for improving
the service quality of distributed systems and reducing economic losses. However, most …

Semi-supervised and unsupervised anomaly detection by mining numerical workflow relations from system logs

B Zhang, H Zhang, VH Le, P Moscato… - Automated Software …, 2023 - Springer
Large-scale software-intensive systems often generate logs for troubleshooting purpose.
The system logs are semi-structured text messages that record the internal status of a …

Time machine: generative real-time model for failure (and lead time) prediction in hpc systems

KA Alharthi, A Jhumka, S Di, L Gui… - 2023 53rd Annual …, 2023 - ieeexplore.ieee.org
High Performance Computing (HPC) systems generate a large amount of unstructured/
alphanumeric log messages that capture the health state of their components. Due to their …