[HTML][HTML] Deep learning for anomaly detection in log data: A survey

M Landauer, S Onder, F Skopik… - Machine Learning with …, 2023 - Elsevier
Automatic log file analysis enables early detection of relevant incidents such as system
failures. In particular, self-learning anomaly detection techniques capture patterns in log …

Bert-log: Anomaly detection for system logs based on pre-trained language model

S Chen, H Liao - Applied Artificial Intelligence, 2022 - Taylor & Francis
Logs are primary information resource for fault diagnosis and anomaly detection in large-
scale computer systems, but it is hard to classify anomalies from system logs. Recent studies …

Logencoder: Log-based contrastive representation learning for anomaly detection

J Qi, Z Luan, S Huang, C Fung, H Yang… - … on Network and …, 2023 - ieeexplore.ieee.org
In recent years, cloud computing centers have grown rapidly in size. Analyzing system logs
is an important way for the quality of service monitoring. However, systems produce massive …

Translog: A unified transformer-based framework for log anomaly detection

H Guo, X Lin, J Yang, Y Zhuang, J Bai, T Zheng… - arxiv preprint arxiv …, 2021 - arxiv.org
Log anomaly detection is a key component in the field of artificial intelligence for IT
operations (AIOps). Considering log data of variant domains, retraining the whole network …

Cyber threat detection: Unsupervised hunting of anomalous commands (UHAC)

VO Kayhan, M Agrawal, S Shivendu - Decision Support Systems, 2023 - Elsevier
The cyber security industry is rapidly adopting threat hunting as a proactive tool for early and
faster detection of suspected malicious actors. In this paper, we propose a machine learning …

LogLG: Weakly Supervised Log Anomaly Detection via Log-Event Graph Construction

H Guo, Y Guo, J Yang, J Liu, Z Li, T Zheng… - … on Database Systems …, 2023 - Springer
Fully supervised log anomaly detection methods suffer the heavy burden of annotating
massive unlabeled log data. Recently, many semi-supervised methods have been proposed …

LogFiT: Log anomaly detection using fine-tuned language models

C Almodovar, F Sabrina, S Karimi… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
System logs are a valuable source of information for monitoring and maintaining the security
and stability of computer systems. Techniques based on Deep Learning and Natural …

PULL: Reactive log anomaly detection based on iterative PU learning

T Wittkopp, D Scheinert, P Wiesner, A Acker… - arxiv preprint arxiv …, 2023 - arxiv.org
Due to the complexity of modern IT services, failures can be manifold, occur at any stage,
and are hard to detect. For this reason, anomaly detection applied to monitoring data such …

Can language models help in system security? Investigating log anomaly detection using BERT

C Almodovar, F Sabrina, S Karimi… - Proceedings of the 20th …, 2022 - aclanthology.org
The log files generated by networked computer systems contain valuable information that
can be used to monitor system security and stability. Recently, techniques based on Deep …

FastLogAD: Log Anomaly Detection with Mask-Guided Pseudo Anomaly Generation and Discrimination

Y Lin, H Deng, X Li - arxiv preprint arxiv:2404.08750, 2024 - arxiv.org
Nowadays large computers extensively output logs to record the runtime status and it has
become crucial to identify any suspicious or malicious activities from the information …