Converting Unstructured System Logs into Structured Event List for Anomaly Detection

被引:3
|
作者
Li, Zongze [1 ]
Davidson, Matthew [1 ]
Fu, Song [1 ]
Blanchard, Sean [2 ,3 ]
Lang, Michael [2 ,3 ]
机构
[1] Univ North Texas, Dept Comp Sci & Engn, Denton, TX 76203 USA
[2] Los Alamos Natl Lab, HPC DES Grp, Los Alamos, NM USA
[3] Los Alamos Natl Lab, Comp Computat & Stat Sci Div, Los Alamos, NM USA
关键词
HPC systems; system reliability; behavior analysis; anomaly detection;
D O I
10.1145/3230833.3230855
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
System logs provide invaluable resources for understanding system behavior and detecting anomalies on high performance computing (HPC) systems. As HPC systems continue to grow in both scale and complexity, the sheer volume of system logs and the complex interaction among system components make the traditional manual problem diagnosis and even automated line-by-line log analysis infeasible or ineffective. In this paper, we present a System Log Event Block Detection (SLEBD) framework that identifies groups of log messages that follow certain sequence but with variations, and explore these event blocks for event-based system behavior analysis and anomaly detection. Compared with the existing approaches that analyze system logs line by line, SLEBD is capable of characterizing system behavior and identifying intricate anomalies at a higher (i.e., event) level. We evaluate the performance of SLEBD by using syslogs collected from production supercomputers. Experimental results show that our framework and mechanisms can process streaming log messages, efficiently extract event blocks and effectively detect anomalies, which enables system administrators and monitoring tools to understand and process system events in real time. Additionally, we use the identified event blocks and explore deep learning algorithms to model and classify event sequences.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] ADOps: An Anomaly Detection Pipeline in Structured Logs
    Song, Xintong
    Zhu, Yusen
    Wu, Jianfei
    Liu, Bai
    Wei, Hongkang
    [J]. PROCEEDINGS OF THE VLDB ENDOWMENT, 2023, 16 (12): : 4050 - 4053
  • [2] Anomaly Detection on Event Logs with a Scarcity of Labels
    Barbon Junior, Sylvio
    Ceravolo, Paolo
    Damiani, Ernesto
    Omori, Nicolas Jashchenko
    Tavares, Gabriel Marques
    [J]. 2020 2ND INTERNATIONAL CONFERENCE ON PROCESS MINING (ICPM 2020), 2020, : 161 - 168
  • [3] SwissLog: Robust Anomaly Detection and Localization for Interleaved Unstructured Logs
    Li, Xiaoyun
    Chen, Pengfei
    Jing, Linxiao
    He, Zilong
    Yu, Guangba
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (04) : 2762 - 2780
  • [4] Discovering Structured Event Logs from Unstructured Audit Trails for Workflow Mining
    Geng, Liqiang
    Buffett, Scott
    Hamilton, Bruce
    Wang, Xin
    Korba, Larry
    Liu, Hongyu
    Wang, Yunli
    [J]. FOUNDATIONS OF INTELLIGENT SYSTEMS, PROCEEDINGS, 2009, 5722 : 442 - +
  • [5] How to Configure Masked Event Anomaly Detection on Software Logs?
    Nyyssola, Jesse
    Mantyla, Mika
    Varela, Martin
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION (ICSME 2022), 2022, : 414 - 418
  • [6] A Systematic Review of Anomaly Detection for Business Process Event Logs
    Ko, Jonghyeon
    Comuzzi, Marco
    [J]. BUSINESS & INFORMATION SYSTEMS ENGINEERING, 2023, 65 (04) : 441 - 462
  • [7] A Systematic Review of Anomaly Detection for Business Process Event Logs
    Jonghyeon Ko
    Marco Comuzzi
    [J]. Business & Information Systems Engineering, 2023, 65 : 441 - 462
  • [8] Self-Attentive Classification-Based Anomaly Detection in Unstructured Logs
    Nedelkoski, Sasho
    Bogatinovski, Jasmin
    Acker, Alexander
    Cardoso, Jorge
    Kao, Odej
    [J]. 20TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING (ICDM 2020), 2020, : 1196 - 1201
  • [9] A Survey of Deep Anomaly Detection for System Logs
    Zhao, Xiaoqing
    Jiang, Zhongyuan
    Ma, Jianfeng
    [J]. 2022 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2022,
  • [10] System anomaly detection: Mining firewall logs
    Winding, Robert
    Wright, Timothy
    Chapple, Michael
    [J]. 2006 SECURECOMM AND WORKSHOPS, 2006, : 389 - +