Anomaly Detection of Software System Logs based on Natural Language Processing

被引:0
|
作者
Wang, Mengying [1 ,2 ]
Xu, Lele [1 ]
Guo, Lili [1 ]
机构
[1] Chinese Acad Sci, Technol & Engn Ctr Space Utilizat, Key Lab Space Utilizat, Beijing 100094, Peoples R China
[2] Univ Chinese Acad Sci, Beijing 100049, Peoples R China
基金
中国国家自然科学基金;
关键词
anomaly detection; natural language processing; machine learning; classification algorithms;
D O I
10.1117/12.2513857
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
System logs record the daily status of operating systems, application software, firewalls, etc. Analyzing system logs can help to prevent and eliminate information security events in real time. In this paper, we propose to analyze the system logs for anomalous event detection based on natural language processing. First, we use doc2vec of natural language processing algorithm to construct sentence vectors, then apply several state-of-the-art classification algorithms on the sentence vectors for anomaly detection. The system logs generated by the Thunderbird supercomputer are adopted here to verify the proposed method. The results show that doc2vec combined with machine learning classification algorithms could not only effectively extract the semantic information of the logs, but also perform excellent anomaly detection.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] Anomaly Detection of System Logs Based on Natural Language Processing and Deep Learning
    Wang, Mengying
    Xu, Lele
    Guo, Lili
    [J]. 2018 4TH INTERNATIONAL CONFERENCE ON FRONTIERS OF SIGNAL PROCESSING (ICFSP 2018), 2018, : 140 - 144
  • [2] Natural Language Processing-based Model for Log Anomaly Detection
    Li, Zezhou
    Zhang, Jing
    Zhang, Xianbo
    Lin, Feng
    Wang, Chao
    Cai, Xingye
    [J]. 2022 2ND IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND ARTIFICIAL INTELLIGENCE (SEAI 2022), 2022, : 129 - 134
  • [3] Latent Variable Based Anomaly Detection in Network System Logs
    Otomo, Kazuki
    Kobayashi, Satoru
    Fukuda, Kensuke
    Esaki, Hiroshi
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2019, E102D (09) : 1644 - 1652
  • [4] ConAnomaly: Content-Based Anomaly Detection for System Logs
    Lv, Dan
    Luktarhan, Nurbol
    Chen, Yiyong
    [J]. SENSORS, 2021, 21 (18)
  • [5] BERT-Log: Anomaly Detection for System Logs Based on Pre-trained Language Model
    Chen, Song
    Liao, Hai
    [J]. APPLIED ARTIFICIAL INTELLIGENCE, 2022, 36 (01)
  • [6] Anomaly Detection on Natural Language Processing to Improve Predictions on Tourist Preferences
    Meira, Jorge
    Carneiro, Joao
    Bolon-Canedo, Veronica
    Alonso-Betanzos, Amparo
    Novais, Paulo
    Marreiros, Goreti
    [J]. ELECTRONICS, 2022, 11 (05)
  • [7] How to Configure Masked Event Anomaly Detection on Software Logs?
    Nyyssola, Jesse
    Mantyla, Mika
    Varela, Martin
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION (ICSME 2022), 2022, : 414 - 418
  • [8] A Survey of Deep Anomaly Detection for System Logs
    Zhao, Xiaoqing
    Jiang, Zhongyuan
    Ma, Jianfeng
    [J]. 2022 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2022,
  • [9] System anomaly detection: Mining firewall logs
    Winding, Robert
    Wright, Timothy
    Chapple, Michael
    [J]. 2006 SECURECOMM AND WORKSHOPS, 2006, : 389 - +
  • [10] Contextual Anomaly Detection for a Critical Industrial System based on Logs and Metrics
    Farshchi, Mostafa
    Weber, Ingo
    Della Corte, Raffaele
    Pecchia, Antonio
    Cinque, Marcello
    Schneider, Jean-Guy
    Grundy, John
    [J]. 2018 14TH EUROPEAN DEPENDABLE COMPUTING CONFERENCE (EDCC 2018), 2018, : 140 - 143