ConAnomaly: Content-Based Anomaly Detection for System Logs

被引:12
|
作者
Lv, Dan [1 ]
Luktarhan, Nurbol [1 ]
Chen, Yiyong [1 ]
机构
[1] Xinjiang Univ, Coll Informat Sci & Engn, Urumqi 830046, Peoples R China
基金
中国国家社会科学基金;
关键词
log anomaly detection; log sequence encoder; LSTM;
D O I
10.3390/s21186125
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Enterprise systems typically produce a large number of logs to record runtime states and important events. Log anomaly detection is efficient for business management and system maintenance. Most existing log-based anomaly detection methods use log parser to get log event indexes or event templates and then utilize machine learning methods to detect anomalies. However, these methods cannot handle unknown log types and do not take advantage of the log semantic information. In this article, we propose ConAnomaly, a log-based anomaly detection model composed of a log sequence encoder (log2vec) and multi-layer Long Short Term Memory Network (LSTM). We designed log2vec based on the Word2vec model, which first vectorized the words in the log content, then deleted the invalid words through part of speech tagging, and finally obtained the sequence vector by the weighted average method. In this way, ConAnomaly not only captures semantic information in the log but also leverages log sequential relationships. We evaluate our proposed approach on two log datasets. Our experimental results show that ConAnomaly has good stability and can deal with unseen log types to a certain extent, and it provides better performance than most log-based anomaly detection methods.
引用
收藏
页数:16
相关论文
共 50 条
  • [1] Content-based methodology for anomaly detection on the web
    Last, M
    Shapira, B
    Elovici, Y
    Zaafrany, O
    Kandel, A
    [J]. ADVANCES IN WEB INTELLIGENCE, 2003, 2663 : 113 - 123
  • [2] ZOE: Content-based Anomaly Detection for Industrial Control Systems
    Wressnegger, Christian
    Kellner, Ansgar
    Rieck, Konrad
    [J]. 2018 48TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN), 2018, : 127 - 138
  • [3] Latent Variable Based Anomaly Detection in Network System Logs
    Otomo, Kazuki
    Kobayashi, Satoru
    Fukuda, Kensuke
    Esaki, Hiroshi
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2019, E102D (09) : 1644 - 1652
  • [4] A content-based deep intrusion detection system
    Soltani, Mahdi
    Siavoshani, Mahdi Jafari
    Jahangir, Amir Hossein
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2022, 21 (03) : 547 - 562
  • [5] A content-based deep intrusion detection system
    Mahdi Soltani
    Mahdi Jafari Siavoshani
    Amir Hossein Jahangir
    [J]. International Journal of Information Security, 2022, 21 : 547 - 562
  • [6] Unsupervised Content-Based Characterization and Anomaly Detection of Online Community Dynamics
    Shah, Danelle
    Hurley, Michael
    Liu, Jessamyn
    Daggett, Matthew
    [J]. PROCEEDINGS OF THE 52ND ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2019, : 2264 - 2273
  • [7] A Survey of Deep Anomaly Detection for System Logs
    Zhao, Xiaoqing
    Jiang, Zhongyuan
    Ma, Jianfeng
    [J]. 2022 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2022,
  • [8] System anomaly detection: Mining firewall logs
    Winding, Robert
    Wright, Timothy
    Chapple, Michael
    [J]. 2006 SECURECOMM AND WORKSHOPS, 2006, : 389 - +
  • [9] Anomaly Detection of Software System Logs based on Natural Language Processing
    Wang, Mengying
    Xu, Lele
    Guo, Lili
    [J]. 2018 INTERNATIONAL CONFERENCE ON IMAGE AND VIDEO PROCESSING, AND ARTIFICIAL INTELLIGENCE, 2018, 10836
  • [10] Contextual Anomaly Detection for a Critical Industrial System based on Logs and Metrics
    Farshchi, Mostafa
    Weber, Ingo
    Della Corte, Raffaele
    Pecchia, Antonio
    Cinque, Marcello
    Schneider, Jean-Guy
    Grundy, John
    [J]. 2018 14TH EUROPEAN DEPENDABLE COMPUTING CONFERENCE (EDCC 2018), 2018, : 140 - 143