On the effectiveness of log representation for log-based anomaly detection

被引:0
|
作者
Xingfang Wu
Heng Li
Foutse Khomh
机构
[1] Polytechnique Montreal,Department of Computer Engineering and Software Engineering
来源
关键词
Log representation; Anomaly detection; Automated log analysis;
D O I
暂无
中图分类号
学科分类号
摘要
Logs are an essential source of information for people to understand the running status of a software system. Due to the evolving modern software architecture and maintenance methods, more research efforts have been devoted to automated log analysis. In particular, machine learning (ML) has been widely used in log analysis tasks. In ML-based log analysis tasks, converting textual log data into numerical feature vectors is a critical and indispensable step. However, the impact of using different log representation techniques on the performance of the downstream models is not clear, which limits researchers and practitioners’ opportunities of choosing the optimal log representation techniques in their automated log analysis workflows. Therefore, this work investigates and compares the commonly adopted log representation techniques from previous log analysis research. Particularly, we select six log representation techniques and evaluate them with seven ML models and four public log datasets (i.e., HDFS, BGL, Spirit and Thunderbird) in the context of log-based anomaly detection.We also examine the impacts of the log parsing process and the different feature aggregation approaches when they are employed with log representation techniques. From the experiments, we provide some heuristic guidelines for future researchers and developers to follow when designing an automated log analysis workflow. We believe our comprehensive comparison of log representation techniques can help researchers and practitioners better understand the characteristics of different log representation techniques and provide them with guidance for selecting the most suitable ones for their ML-based log analysis workflow.
引用
收藏
相关论文
共 50 条
  • [31] Log-Based Testing
    Elyasov, Alexander
    [J]. 2012 34TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), 2012, : 1591 - 1594
  • [32] Unsupervised Learning and Online Anomaly Detection: An On-Condition Log-Based Maintenance System
    Decker, Leticia
    Leite, Daniel
    Minarini, Francesco
    Tisbeni, Simone Rossi
    Bonacorsi, Daniele
    [J]. INTERNATIONAL JOURNAL OF EMBEDDED AND REAL-TIME COMMUNICATION SYSTEMS (IJERTCS), 2022, 13 (01):
  • [33] Log-based Anomaly Detection from Multi-view by Associating Anomaly Scores with User Trust
    Wang, Lin
    Zhang, Kun
    Li, Chen
    Tu, Bibo
    [J]. 2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 643 - 650
  • [34] Semi-supervised Log-based Anomaly Detection via Probabilistic Label Estimation
    Yang, Lin
    Chen, Junjie
    Wang, Zan
    Wang, Weijing
    Jiang, Jiajun
    Dong, Xuyuan
    Zhang, Wenbin
    [J]. 2021 IEEE/ACM 43RD INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2021), 2021, : 1448 - 1460
  • [35] Augmenting Log-based Anomaly Detection Models to Reduce False Anomalies with Human Feedback
    Jia, Tong
    Li, Ying
    Yang, Yong
    Huang, Gang
    Wu, Zhonghai
    [J]. PROCEEDINGS OF THE 28TH ACM SIGKDD CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, KDD 2022, 2022, : 3081 - 3089
  • [36] Log-based sparse nonnegative matrix factorization for data representation
    Peng, Chong
    Zhang, Yiqun
    Chen, Yongyong
    Kang, Zhao
    Chen, Chenglizhao
    Cheng, Qiang
    [J]. KNOWLEDGE-BASED SYSTEMS, 2022, 251
  • [37] LogNADS: Network anomaly detection scheme based on log semantics representation
    Liu, Xu
    Liu, Weiyou
    Di, Xiaoqiang
    Li, Jinqing
    Cai, Binbin
    Ren, Weiwu
    Yang, Huamin
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2021, 124 : 390 - 405
  • [38] Pushing log-based reconciliation
    Hamadi, Y
    Shapiro, M
    [J]. INTERNATIONAL JOURNAL ON ARTIFICIAL INTELLIGENCE TOOLS, 2005, 14 (03) : 445 - 458
  • [39] Try with Simpler-An Evaluation of Improved Principal Component Analysis in Log-based Anomaly Detection
    Yang, Lin
    Chen, Junjie
    Gao, Shutao
    Gong, Zhihao
    Zhang, Hongyu
    Kang, Yue
    Li, Huaan
    [J]. ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2024, 33 (05)
  • [40] A Log-Based Anomaly Detection Method with Efficient Neighbor Searching and Automatic K Neighbor Selection
    Wang, Bingming
    Ying, Shi
    Yang, Zhe
    [J]. SCIENTIFIC PROGRAMMING, 2020, 2020