A survey on automated log analysis for reliability engineering

S He, P He, Z Chen, T Yang, Y Su, MR Lyu - ACM computing surveys …, 2021 - dl.acm.org
Logs are semi-structured text generated by logging statements in software source code. In
recent decades, software logs have become imperative in the reliability assurance …

Experience report: System log analysis for anomaly detection

S He, J Zhu, P He, MR Lyu - 2016 IEEE 27th international …, 2016 - ieeexplore.ieee.org
Anomaly detection plays an important role in management of modern large-scale distributed
systems. Logs, which record system runtime information, are widely used for anomaly …

MODE: automated neural network model debugging via state differential analysis and input selection

S Ma, Y Liu, WC Lee, X Zhang, A Grama - … of the 2018 26th ACM Joint …, 2018 - dl.acm.org
Artificial intelligence models are becoming an integral part of modern computing systems.
Just like software inevitably has bugs, models have bugs too, leading to poor classification …

An evaluation study on log parsing and its use in log mining

P He, J Zhu, S He, J Li, MR Lyu - 2016 46th annual IEEE/IFIP …, 2016 - ieeexplore.ieee.org
Logs, which record runtime information of modern systems, are widely utilized by developers
(and operators) in system development and maintenance. Due to the ever-increasing size of …

Towards automated log parsing for large-scale log data analysis

P He, J Zhu, S He, J Li, MR Lyu - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Logs are widely used in system management for dependability assurance because they are
often the only data available that record detailed system runtime behaviors in production …

System log parsing: A survey

T Zhang, H Qiu, G Castellano, M Rifai… - … on Knowledge and …, 2023 - ieeexplore.ieee.org
Modern information and communication systems have become increasingly challenging to
manage. The ubiquitous system logs contain plentiful information and are thus widely …

A survey on network verification and testing with formal methods: Approaches and challenges

Y Li, X Yin, Z Wang, J Yao, X Shi, J Wu… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Networks have grown increasingly complicated. Violations of intended policies can
compromise network availability and network reliability. Network operators need to ensure …

A search-based approach for accurate identification of log message formats

S Messaoudi, A Panichella, D Bianculli… - Proceedings of the 26th …, 2018 - dl.acm.org
Many software engineering activities process the events contained in log files. However,
before performing any processing activity, it is necessary to parse the entries in a log file, to …

Taking a long look at QUIC: an approach for rigorous evaluation of rapidly evolving transport protocols

AM Kakhki, S Jero, D Choffnes, C Nita-Rotaru… - proceedings of the …, 2017 - dl.acm.org
Google's QUIC protocol, which implements TCP-like properties at the application layer atop
a UDP transport, is now used by the vast majority of Chrome clients accessing Google …

Loghub: A large collection of system log datasets for ai-driven log analytics

J Zhu, S He, P He, J Liu, MR Lyu - 2023 IEEE 34th International …, 2023 - ieeexplore.ieee.org
Logs have been widely adopted in software system development and maintenance because
of the rich runtime information they record. In recent years, the increase of software size and …