Anomaly Detection on System Generated Logs-A Survey Study

被引:3
|
作者
Jose, Jisha M. [1 ]
Reeja, S. R. [1 ]
机构
[1] Dayananda Sagar Univ, Bangalore, Karnataka, India
关键词
Anomaly detection; System logs; Anomaly types; Log analysis;
D O I
10.1007/978-981-16-1866-6_59
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, the application and systems are generating huge amounts of log data. With the rise of different applications in different domains that are deployed in every environment, it has become inevitable that a system may run into either functional or performance faults. System analyst and administrators have to look at system log data at the time of fault, and analysing millions of lines of logs manually is an impossible task to find the root cause for any faults. Timely detection of any abnormal behaviour is very important to prevent negative impact on the service, thereby helping to build a secure and trustworthy system. The aim of this survey is to provide a comprehensive overview of recent research in supervised and unsupervised anomaly detection methods. A detailed review on the various adoption methods and data sets on which it has been applied across various application domains are discussed in this paper.
引用
收藏
页码:779 / 793
页数:15
相关论文
共 50 条
  • [1] A Survey of Deep Anomaly Detection for System Logs
    Zhao, Xiaoqing
    Jiang, Zhongyuan
    Ma, Jianfeng
    [J]. 2022 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2022,
  • [2] System anomaly detection: Mining firewall logs
    Winding, Robert
    Wright, Timothy
    Chapple, Michael
    [J]. 2006 SECURECOMM AND WORKSHOPS, 2006, : 389 - +
  • [3] Publishing Search Logs-A Comparative Study of Privacy Guarantees
    Goetz, Michaela
    Machanavajjhala, Ashwin
    Wang, Guozhang
    Xiao, Xiaokui
    Gehrke, Johannes
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2012, 24 (03) : 520 - 532
  • [4] Valid Probabilistic Anomaly Detection Models for System Logs
    Liu, Chunbo
    Pan, Lanlan
    Gu, Zhaojun
    Wang, Jialiang
    Ren, Yitong
    Wang, Zhi
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020
  • [5] DeepEAD: Explainable Anomaly Detection from System Logs
    Wang, Xinda
    Kim, Kyeong Jin
    Wang, Ye
    Koike-Akino, Toshiaki
    Parsons, Kieran
    [J]. ICC 2023-IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2023, : 771 - 776
  • [6] AutoLog: Anomaly detection by deep autoencoding of system logs
    Catillo, Marta
    Pecchia, Antonio
    Villano, Umberto
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2022, 191
  • [7] An Integrated Method for Anomaly Detection From Massive System Logs
    Liu, Zhaoli
    Qin, Tao
    Guan, Xiaohong
    Jiang, Hezhi
    Wang, Chenxu
    [J]. IEEE ACCESS, 2018, 6 : 30602 - 30611
  • [8] Latent Variable Based Anomaly Detection in Network System Logs
    Otomo, Kazuki
    Kobayashi, Satoru
    Fukuda, Kensuke
    Esaki, Hiroshi
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2019, E102D (09) : 1644 - 1652
  • [9] ConAnomaly: Content-Based Anomaly Detection for System Logs
    Lv, Dan
    Luktarhan, Nurbol
    Chen, Yiyong
    [J]. SENSORS, 2021, 21 (18)
  • [10] Anomaly Detection Using System Logs: A Deep Learning Approach
    Sinha, Rohit
    Sur, Rittika
    Sharma, Ruchi
    Shrivastava, Avinash K.
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2022, 16 (01)