SwissLog: Robust Anomaly Detection and Localization for Interleaved Unstructured Logs

被引:14
|
作者
Li, Xiaoyun [1 ]
Chen, Pengfei [1 ]
Jing, Linxiao [1 ]
He, Zilong [1 ]
Yu, Guangba [1 ]
机构
[1] Sun Yat Sen Univ, Sch Comp Sci & Engn, Guangzhou 510006, Guangdong, Peoples R China
基金
中国国家自然科学基金;
关键词
Deep learning; log parsing; anomaly detection; anomaly localization; log correlation; DIAGNOSIS;
D O I
10.1109/TDSC.2022.3162857
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Modern distributed systems generate interleaved logs when running in parallel. Identifiers (ID) are always attached to them to trace running instances or entities in logs. Therefore, log messages can be grouped by the same IDs to help anomaly detection and localization. The existing approaches to achieve this still fall short meeting these challenges: 1) Log is solely processed in single components without mining log dependencies. 2) Log formats are continually changing in modern software systems. 3) It is challenging to detect latent performance issues non-intrusively by trivial monitoring tools. To remedy the above shortcomings, we propose SwissLog, a robust anomaly detection and localization tool for interleaved unstructured logs. SwissLog focuses on log sequential anomalies and tries to dig out possible performance issues. SwissLog constructs ID relation graphs across distributed components and groups log messages by IDs. Moreover, we propose an online data-driven log parser without parameter tuning. The grouped log messages are parsed via the novel log parser and transformed with semantic and temporal embedding. Finally, SwissLog utilizes an attention-based Bi-LSTM model and a heuristic searching algorithm to detect and localize anomalies in instance-granularity, respectively. The experiments on real-world and synthetic datasets confirm the effectiveness, efficiency, and robustness of SwissLog.
引用
收藏
页码:2762 / 2780
页数:19
相关论文
共 50 条
  • [1] Converting Unstructured System Logs into Structured Event List for Anomaly Detection
    Li, Zongze
    Davidson, Matthew
    Fu, Song
    Blanchard, Sean
    Lang, Michael
    [J]. 13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
  • [2] SwissLog: Robust and Unified Deep Learning Based Log Anomaly Detection for Diverse Faults
    Li, Xiaoyun
    Chen, Pengfei
    Jing, Linxiao
    He, Zilong
    Yu, Guangba
    [J]. 2020 IEEE 31ST INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE 2020), 2020, : 92 - 103
  • [3] Self-Attentive Classification-Based Anomaly Detection in Unstructured Logs
    Nedelkoski, Sasho
    Bogatinovski, Jasmin
    Acker, Alexander
    Cardoso, Jorge
    Kao, Odej
    [J]. 20TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING (ICDM 2020), 2020, : 1196 - 1201
  • [4] Anomaly detection in smart card logs and distant evaluation with Twitter: a robust framework
    Tonnelier, E.
    Baskiotis, N.
    Guigue, V.
    Gallinari, P.
    [J]. NEUROCOMPUTING, 2018, 298 : 109 - 121
  • [5] A Survey of Deep Anomaly Detection for System Logs
    Zhao, Xiaoqing
    Jiang, Zhongyuan
    Ma, Jianfeng
    [J]. 2022 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2022,
  • [6] Anomaly Detection on Event Logs with a Scarcity of Labels
    Barbon Junior, Sylvio
    Ceravolo, Paolo
    Damiani, Ernesto
    Omori, Nicolas Jashchenko
    Tavares, Gabriel Marques
    [J]. 2020 2ND INTERNATIONAL CONFERENCE ON PROCESS MINING (ICPM 2020), 2020, : 161 - 168
  • [7] System anomaly detection: Mining firewall logs
    Winding, Robert
    Wright, Timothy
    Chapple, Michael
    [J]. 2006 SECURECOMM AND WORKSHOPS, 2006, : 389 - +
  • [8] ADOps: An Anomaly Detection Pipeline in Structured Logs
    Song, Xintong
    Zhu, Yusen
    Wu, Jianfei
    Liu, Bai
    Wei, Hongkang
    [J]. PROCEEDINGS OF THE VLDB ENDOWMENT, 2023, 16 (12): : 4050 - 4053
  • [9] A Comprehensive Review of Anomaly Detection in Web Logs
    Majd, Mehryar
    Najafi, Pejman
    Alhosseini, Seyed Ali
    Cheng, Feng
    Meinel, Christoph
    [J]. 2022 IEEE/ACM INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING, APPLICATIONS AND TECHNOLOGIES, BDCAT, 2022, : 158 - 165
  • [10] User Profiling in Anomaly Detection of Authorization Logs
    Zamanian, Zahedeh
    Feizollah, Ali
    Anuar, Nor Badrul
    Kiah, Laiha Binti Mat
    Srikanth, Karanam
    Kumar, Sudhindra
    [J]. COMPUTATIONAL SCIENCE AND TECHNOLOGY, 2019, 481 : 59 - 65