[HTML][HTML] Deep learning for anomaly detection in log data: A survey
Automatic log file analysis enables early detection of relevant incidents such as system
failures. In particular, self-learning anomaly detection techniques capture patterns in log …
failures. In particular, self-learning anomaly detection techniques capture patterns in log …
Bert-log: Anomaly detection for system logs based on pre-trained language model
Logs are primary information resource for fault diagnosis and anomaly detection in large-
scale computer systems, but it is hard to classify anomalies from system logs. Recent studies …
scale computer systems, but it is hard to classify anomalies from system logs. Recent studies …
Logencoder: Log-based contrastive representation learning for anomaly detection
In recent years, cloud computing centers have grown rapidly in size. Analyzing system logs
is an important way for the quality of service monitoring. However, systems produce massive …
is an important way for the quality of service monitoring. However, systems produce massive …
Translog: A unified transformer-based framework for log anomaly detection
Log anomaly detection is a key component in the field of artificial intelligence for IT
operations (AIOps). Considering log data of variant domains, retraining the whole network …
operations (AIOps). Considering log data of variant domains, retraining the whole network …
Cyber threat detection: Unsupervised hunting of anomalous commands (UHAC)
The cyber security industry is rapidly adopting threat hunting as a proactive tool for early and
faster detection of suspected malicious actors. In this paper, we propose a machine learning …
faster detection of suspected malicious actors. In this paper, we propose a machine learning …
LogLG: Weakly Supervised Log Anomaly Detection via Log-Event Graph Construction
Fully supervised log anomaly detection methods suffer the heavy burden of annotating
massive unlabeled log data. Recently, many semi-supervised methods have been proposed …
massive unlabeled log data. Recently, many semi-supervised methods have been proposed …
LogFiT: Log anomaly detection using fine-tuned language models
System logs are a valuable source of information for monitoring and maintaining the security
and stability of computer systems. Techniques based on Deep Learning and Natural …
and stability of computer systems. Techniques based on Deep Learning and Natural …
PULL: Reactive log anomaly detection based on iterative PU learning
Due to the complexity of modern IT services, failures can be manifold, occur at any stage,
and are hard to detect. For this reason, anomaly detection applied to monitoring data such …
and are hard to detect. For this reason, anomaly detection applied to monitoring data such …
Can language models help in system security? Investigating log anomaly detection using BERT
The log files generated by networked computer systems contain valuable information that
can be used to monitor system security and stability. Recently, techniques based on Deep …
can be used to monitor system security and stability. Recently, techniques based on Deep …
FastLogAD: Log Anomaly Detection with Mask-Guided Pseudo Anomaly Generation and Discrimination
Nowadays large computers extensively output logs to record the runtime status and it has
become crucial to identify any suspicious or malicious activities from the information …
become crucial to identify any suspicious or malicious activities from the information …