ADOps: An Anomaly Detection Pipeline in Structured Logs

被引:0
|
作者
Song, Xintong [1 ]
Zhu, Yusen [1 ]
Wu, Jianfei [1 ]
Liu, Bai [1 ]
Wei, Hongkang [1 ]
机构
[1] NetEase Fuxi AI Lab, Hangzhou, Peoples R China
来源
PROCEEDINGS OF THE VLDB ENDOWMENT | 2023年 / 16卷 / 12期
关键词
D O I
10.14778/3611540.3611618
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Anomaly detection has been extensively implemented in industry. The reality is that an application may have numerous scenarios where anomalies need to be monitored. However, the complete process of anomaly detection will take much time, including data acquisition, data processing, model training, and model deployment. In particular, some simple scenarios do not require building complex anomaly detection models. This results in a waste of resources. To solve these problems, we build an anomaly detection pipeline(ADOps) to modularize each step. For simple anomaly detection scenarios, no programming is required and new anomaly detection tasks can be created by simply modifying the configuration file. In addition, it can also improve the development efficiency of complex anomaly detection models. We show how users create anomaly detection tasks on the anomaly detection pipeline and how engineers use it to develop anomaly detection models.
引用
收藏
页码:4050 / 4053
页数:4
相关论文
共 50 条
  • [1] Converting Unstructured System Logs into Structured Event List for Anomaly Detection
    Li, Zongze
    Davidson, Matthew
    Fu, Song
    Blanchard, Sean
    Lang, Michael
    [J]. 13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
  • [2] A Survey of Deep Anomaly Detection for System Logs
    Zhao, Xiaoqing
    Jiang, Zhongyuan
    Ma, Jianfeng
    [J]. 2022 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2022,
  • [3] Anomaly Detection on Event Logs with a Scarcity of Labels
    Barbon Junior, Sylvio
    Ceravolo, Paolo
    Damiani, Ernesto
    Omori, Nicolas Jashchenko
    Tavares, Gabriel Marques
    [J]. 2020 2ND INTERNATIONAL CONFERENCE ON PROCESS MINING (ICPM 2020), 2020, : 161 - 168
  • [4] System anomaly detection: Mining firewall logs
    Winding, Robert
    Wright, Timothy
    Chapple, Michael
    [J]. 2006 SECURECOMM AND WORKSHOPS, 2006, : 389 - +
  • [5] A Comprehensive Review of Anomaly Detection in Web Logs
    Majd, Mehryar
    Najafi, Pejman
    Alhosseini, Seyed Ali
    Cheng, Feng
    Meinel, Christoph
    [J]. 2022 IEEE/ACM INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING, APPLICATIONS AND TECHNOLOGIES, BDCAT, 2022, : 158 - 165
  • [6] User Profiling in Anomaly Detection of Authorization Logs
    Zamanian, Zahedeh
    Feizollah, Ali
    Anuar, Nor Badrul
    Kiah, Laiha Binti Mat
    Srikanth, Karanam
    Kumar, Sudhindra
    [J]. COMPUTATIONAL SCIENCE AND TECHNOLOGY, 2019, 481 : 59 - 65
  • [7] ANOMALY DETECTION ALGORITHMS IN BUSINESS PROCESS LOGS
    Bezerra, Fabio
    Wainer, Jacques
    [J]. ICEIS 2008: PROCEEDINGS OF THE TENTH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS, VOL AIDSS: ARTIFICIAL INTELLIGENCE AND DECISION SUPPORT SYSTEMS, 2008, : 11 - 18
  • [8] Automated EWMA Anomaly Detection Pipeline
    Gilletly, Samuel D.
    Cauthen, Katherine
    Mott, Joshua
    [J]. 2022 AMERICAN CONTROL CONFERENCE, ACC, 2022, : 4203 - 4210
  • [9] Valid Probabilistic Anomaly Detection Models for System Logs
    Liu, Chunbo
    Pan, Lanlan
    Gu, Zhaojun
    Wang, Jialiang
    Ren, Yitong
    Wang, Zhi
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020
  • [10] Exploring syntactical features for anomaly detection in application logs
    Copstein, Rafael
    Karlsen, Egil
    Schwartzentruber, Jeff
    Zincir-Heywood, Nur
    Heywood, Malcolm
    [J]. IT-INFORMATION TECHNOLOGY, 2022, 64 (1-2): : 15 - 27