Latent Variable Based Anomaly Detection in Network System Logs

被引:15
|
作者
Otomo, Kazuki [1 ]
Kobayashi, Satoru [2 ]
Fukuda, Kensuke [2 ,3 ]
Esaki, Hiroshi [1 ]
机构
[1] Univ Tokyo, Grad Sch Informat Sci & Technol, Tokyo 1138654, Japan
[2] Natl Inst Informat, Tokyo 1018430, Japan
[3] Sokendai, Dept Informat, Tokyo 1018430, Japan
关键词
network operation; system logs; syslog; anomaly detection; latent variable analysis; variational autoencoder;
D O I
10.1587/transinf.2018OFP0007
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
System logs are useful to understand the status of and detect faults in large scale networks. However, due to their diversity and volume of these logs, log analysis requires much time and effort. In this paper, we propose a log event anomaly detection method for large-scale networks without pre-processing and feature extraction. The key idea is to embed a large amount of diverse data into hidden states by using latent variables. We evaluate our method with 12 months of system logs obtained from a nation-wide academic network in Japan. Through comparisons with Kleinberg's univariate burst detection and a traditional multivariate analysis (i.e., PCA), we demonstrate that our proposed method achieves 14.5% higher recall and 3% higher precision than PCA. A case study shows detected anomalies are effective information for troubleshooting of network system faults.
引用
收藏
页码:1644 / 1652
页数:9
相关论文
共 50 条
  • [1] Anomaly detection based on system text logs of virtual network functions
    Rim, Daniela N.
    Heo, Dongnyeong
    Lee, Chungjun
    Nam, Sukhyun
    Yoo, Jae-Hyoung
    Hong, James Won-Ki
    Choi, Heeyoul
    [J]. BIG DATA RESEARCH, 2024, 38
  • [2] An Attention-Based GRU Network for Anomaly Detection from System Logs
    Xie, Yixi
    Ji, Lixin
    Cheng, Xiaotao
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2020, E103D (08) : 1916 - 1919
  • [3] LogGAN: A Sequence-Based Generative Adversarial Network for Anomaly Detection Based on System Logs
    Xia, Bin
    Yin, Junjie
    Xu, Jian
    Li, Yun
    [J]. SCIENCE OF CYBER SECURITY, SCISEC 2019, 2019, 11933 : 61 - 76
  • [4] ConAnomaly: Content-Based Anomaly Detection for System Logs
    Lv, Dan
    Luktarhan, Nurbol
    Chen, Yiyong
    [J]. SENSORS, 2021, 21 (18)
  • [5] A Survey of Deep Anomaly Detection for System Logs
    Zhao, Xiaoqing
    Jiang, Zhongyuan
    Ma, Jianfeng
    [J]. 2022 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2022,
  • [6] System anomaly detection: Mining firewall logs
    Winding, Robert
    Wright, Timothy
    Chapple, Michael
    [J]. 2006 SECURECOMM AND WORKSHOPS, 2006, : 389 - +
  • [7] Anomaly Detection of Software System Logs based on Natural Language Processing
    Wang, Mengying
    Xu, Lele
    Guo, Lili
    [J]. 2018 INTERNATIONAL CONFERENCE ON IMAGE AND VIDEO PROCESSING, AND ARTIFICIAL INTELLIGENCE, 2018, 10836
  • [8] Contextual Anomaly Detection for a Critical Industrial System based on Logs and Metrics
    Farshchi, Mostafa
    Weber, Ingo
    Della Corte, Raffaele
    Pecchia, Antonio
    Cinque, Marcello
    Schneider, Jean-Guy
    Grundy, John
    [J]. 2018 14TH EUROPEAN DEPENDABLE COMPUTING CONFERENCE (EDCC 2018), 2018, : 140 - 143
  • [9] Daedalus: Network Anomaly Detection on IDS Stream Logs
    Aniss, Chohra
    Mourad, Debbabi
    Shirani, Paria
    [J]. FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2018, 2019, 11358 : 95 - 111
  • [10] Integrating Traffics with Network Device Logs for Anomaly Detection
    Lu, Jiazhong
    Lv, Fengmao
    Zhuo, Zhongliu
    Zhang, Xiaosong
    Liu, Xiaolei
    Hu, Teng
    Deng, Wei
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2019, 2019