LogNADS: Network anomaly detection scheme based on log semantics representation

被引:14
|
作者
Liu, Xu [1 ,2 ]
Liu, Weiyou [1 ]
Di, Xiaoqiang [1 ,2 ,3 ]
Li, Jinqing [1 ,2 ]
Cai, Binbin [3 ]
Ren, Weiwu [1 ]
Yang, Huamin [1 ,2 ]
机构
[1] Changchun Univ Sci & Technol, Sch Comp Sci & Technol, Changchun, Peoples R China
[2] Jilin Prov Key Lab Network & Informat Secur, Changchun, Peoples R China
[3] Changchun Univ Sci & Technol, Informat Ctr, Changchun 130022, Peoples R China
关键词
Anomaly detection; Log; Semantics representation; LSTM;
D O I
10.1016/j.future.2021.05.024
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Semantics-aware anomaly detection based on log has attracted much attention. However, the existing methods based on the weighted aggregation of all word vectors might lose the semantic relationship of word order and cannot maintain the unique representation, and the methods based on word order-preserving by concatenating all word vectors might lead to a high computation time cost. To solve these issues and further improve the sequential anomaly detection, this paper proposes a network anomaly detection scheme LogNADS by designing a novel log semantics representation method and an adaptive sequence data construction method. It first discards the useless words and then selects theme words to hold the log abstraction and maintain a low time cost as well. Subsequently, it concatenates theme words' vectors based on the original word order to maintain the unique representation and avoid the word order loss. Furthermore, to better detect the sequential anomalies, we utilize the sliding window scheme and design a method to compute the optimal window size for constructing the log sequence self-adaptively, and then LSTM is built to extract timing characteristics of the log sequences. Experimental results conducted on the public benchmark HDFS dataset and BGL dataset demonstrate the effectiveness of LogNADS through comparing with other state-of-the-art methods in the detection accuracy and time cost. Moreover, the statistical significance tests prove the superior performance. (C) 2021 Elsevier B.V. All rights reserved.
引用
收藏
页码:390 / 405
页数:16
相关论文
共 50 条
  • [11] Log Analysis and Prediction for Anomaly Detection in Network Switches
    Nam, Sukhyun
    Jeong, Euidong
    Hong, Jibum
    Yoo, Jae-Hyoung
    Hong, James Won-Ki
    [J]. 2023 19TH INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE MANAGEMENT, CNSM, 2023,
  • [12] Leveraging Log Instructions in Log-based Anomaly Detection
    Bogatinovski, Jasmin
    Madjarov, Gjorgji
    Nedelkoski, Sasho
    Cardoso, Jorge
    Kao, Odej
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING (IEEE SCC 2022), 2022, : 321 - 326
  • [13] Log-based Anomaly Detection Without Log Parsing
    Van-Hoang Le
    Zhang, Hongyu
    [J]. 2021 36TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING ASE 2021, 2021, : 492 - 504
  • [14] Network traffic anomaly detection based on feature-based symbolic representation
    Zhan P.
    Chen L.
    Cao L.-H.
    Li X.-Q.
    [J]. Chen, Lin (chenlin@sdu.edu.cn), 1600, Zhejiang University (54): : 1281 - 1288
  • [15] Distributed Systems Anomaly Detection Based on Log
    Lai, Fenggang
    Zhang, Pan
    Cheng, Ruiying
    Xu, Peng
    [J]. 2021 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES FOR DISASTER MANAGEMENT (ICT-DM), 2021, : 72 - 79
  • [16] MLog: Mogrifier LSTM-Based Log Anomaly Detection Approach Using Semantic Representation
    Fu, Yuanyuan
    Liang, Kun
    Xu, Jian
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (05) : 3537 - 3549
  • [17] Log Anomaly Detection Based on Hierarchical Graph Neural Network and Label Contrastive Coding
    Fang, Yong
    Zhao, Zhiying
    Xu, Yijia
    Liu, Zhonglin
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 74 (02): : 4099 - 4118
  • [18] LLAD: Life-Log Anomaly Detection Based on Recurrent Neural Network LSTM
    Elbasani, Ermal
    Kim, Jeong-Dong
    [J]. JOURNAL OF HEALTHCARE ENGINEERING, 2021, 2021
  • [19] Semi-supervised log anomaly detection based on bidirectional temporal convolution network
    Yin, Zhichao
    Kong, Xian
    Yin, Chunyong
    [J]. COMPUTERS & SECURITY, 2024, 140
  • [20] Log-TF-IDF and NETCONF-Based Network Switch Anomaly Detection
    Nam, Sukhyun
    Jeong, Eui-Dong
    Hong, James Won-Ki
    [J]. International Journal of Network Management, 2025, 35 (01)