LogCAD: An Efficient and Robust Model for Log-Based Conformal Anomaly Detection

被引:0
|
作者
Liu, Chunbo [1 ]
Liang, Mengmeng [2 ]
Hou, Jingwen [2 ]
Gu, Zhaojun [1 ]
Wang, Zhi [3 ]
机构
[1] Civil Aviat Univ China, Informat Secur Evaluat Ctr, Tianjin 300300, Peoples R China
[2] Civil Aviat Univ China, Coll Comp Sci & Technol, Tianjin 300300, Peoples R China
[3] Nankai Univ, Coll Cyber Sci, Tianjin 300350, Peoples R China
基金
美国国家科学基金会;
关键词
Anomaly detection - Classification based methods - Conformal anomaly - Cyber-attacks - Learning methods - Learning models - Logfile - Robust modeling - Semi-structured - Systems operation;
D O I
10.1155/2022/5822124
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Log files are usually semistructured files that record the historical operation information of systems or devices. Researchers often find anomalies by analyzing logs, so as to identify system operation faults and cyberattacks. Traditional classification-based methods, especially deep learning methods, can effectively solve the problem of static log anomaly detection. However, when addressing dynamic unstable logs caused by concept drift and noise, the performance of those methods decreased significantly, and false positives are prone to occur. Retraining model is a choice to solve the log instability problem, but this will greatly increase the computational complexity for deep learning models. The log-based conformal anomaly detection (LogCAD) builds a confidence evaluation mechanism for multiple labels, which can achieve good detection results by making collaborative decisions based on multiple weak classifiers without deep learning. Moreover, LogCAD can be easily extended to dynamic unstable logs. It incrementally updates the trained model with conformal detection results of new samples. Experimental results show that LogCAD can achieve excellent detection results for both dynamic unstable logs and static stable logs. Compared with LogRobust and other deep learning models, it has higher efficiency and wider application scope.
引用
收藏
页数:13
相关论文
共 50 条
  • [41] Log-based anomaly detection for distributed systems: State of the art, industry experience, and open issues
    Wei, Xinjie
    Wang, Jie
    Sun, Chang-ai
    Towey, Dave
    Zhang, Shoufeng
    Zuo, Wanqing
    Yu, Yiming
    Ruan, Ruoyi
    Song, Guyang
    [J]. JOURNAL OF SOFTWARE-EVOLUTION AND PROCESS, 2024, 36 (08)
  • [42] SpikeLog: Log-based anomaly detection via Potential-assisted Spiking Neuron Network
    Qi J.
    Luan Z.
    Huang S.
    Fung C.
    Yang H.
    Qian D.
    [J]. IEEE Transactions on Knowledge and Data Engineering, 2024, 36 (12) : 1 - 15
  • [43] LogRep: Log-based Anomaly Detection by Representing both Semantic and Numeric Information in Raw Messages
    Xie, Xiaoda
    Jiang, Songlei
    Huang, Chenlin
    Yu, Fengyuan
    Deng, Yunjia
    [J]. 2023 IEEE 34TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING, ISSRE, 2023, : 195 - 206
  • [44] Early Exploration of Using ChatGPT for Log-based Anomaly Detection on Parallel File Systems Logs
    Egersdoerfer, Chris
    Zhang, Di
    Dai, Dong
    [J]. PROCEEDINGS OF THE 32ND INTERNATIONAL SYMPOSIUM ON HIGH-PERFORMANCE PARALLEL AND DISTRIBUTED COMPUTING, HPDC 2023, 2023, : 315 - 316
  • [45] System Log Detection Model Based on Conformal Prediction
    Ren, Yitong
    Gu, Zhaojun
    Wang, Zhi
    Tian, Zhihong
    Liu, Chunbo
    Lu, Hui
    Du, Xiaojiang
    Guizani, Mohsen
    [J]. ELECTRONICS, 2020, 9 (02)
  • [46] A MODEL FOR WEBSITE ANOMALY DETECTION BASED ON LOG ANALYSIS
    Han, Xu
    Lv, Tao
    Wei, Lin
    Wu, Yanyan
    Liu, Jianyi
    Wang, Cong
    [J]. 2014 IEEE 3rd International Conference on Cloud Computing and Intelligence Systems (CCIS), 2014, : 604 - 608
  • [47] ASGNet: Adaptive Semantic Gate Networks for Log-Based Anomaly Diagnosis
    Yang, Haitian
    Sun, Degang
    Liu, Wen
    Li, Yanshu
    Wang, Yan
    Huang, Weiqing
    [J]. NEURAL INFORMATION PROCESSING, ICONIP 2023, PT IV, 2024, 14450 : 200 - 212
  • [48] Log-based algorithm for efficient archival access to messages
    [J]. Research Disclosure, 1998, (414):
  • [49] Network Log-Based SSH Brute-Force Attack Detection Model
    Park, Jeonghoon
    Kim, Jinsu
    Gupta, B. B.
    Park, Namje
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 68 (01): : 887 - 901
  • [50] DSGN: Log-based anomaly diagnosis with dynamic semantic gate networks
    Yang, Haitian
    Sun, Degang
    Wang, Yan
    Huang, Weiqing
    [J]. INFORMATION SCIENCES, 2024, 680