A unifying review of deep and shallow anomaly detection

L Ruff, JR Kauffmann, RA Vandermeulen… - Proceedings of the …, 2021 - ieeexplore.ieee.org
Deep learning approaches to anomaly detection (AD) have recently improved the state of
the art in detection performance on complex data sets, such as large collections of images or …

[HTML][HTML] Deep learning for anomaly detection in log data: A survey

M Landauer, S Onder, F Skopik… - Machine Learning with …, 2023 - Elsevier
Automatic log file analysis enables early detection of relevant incidents such as system
failures. In particular, self-learning anomaly detection techniques capture patterns in log …

Log-based anomaly detection with deep learning: How far are we?

VH Le, H Zhang - Proceedings of the 44th international conference on …, 2022 - dl.acm.org
Software-intensive systems produce logs for troubleshooting purposes. Recently, many
deep learning models have been proposed to automatically detect system anomalies based …

Log-based anomaly detection without log parsing

VH Le, H Zhang - … 36th IEEE/ACM International Conference on …, 2021 - ieeexplore.ieee.org
Software systems often record important runtime information in system logs for
troubleshooting purposes. There have been many studies that use log data to construct …

Unifying the perspectives of nlp and software engineering: A survey on language models for code

Z Zhang, C Chen, B Liu, C Liao, Z Gong, H Yu… - arxiv preprint arxiv …, 2023 - arxiv.org
In this work we systematically review the recent advancements in software engineering with
language models, covering 70+ models, 40+ evaluation tasks, 180+ datasets, and 900 …

Deep transfer learning for intrusion detection in industrial control networks: A comprehensive review

H Kheddar, Y Himeur, AI Awad - Journal of Network and Computer …, 2023 - Elsevier
Globally, the external internet is increasingly being connected to industrial control systems.
As a result, there is an immediate need to protect these networks from a variety of threats …

Lanobert: System log anomaly detection based on bert masked language model

Y Lee, J Kim, P Kang - Applied Soft Computing, 2023 - Elsevier
The system log generated in a computer system refers to large-scale data that are collected
simultaneously and used as the basic data for determining errors, intrusion and abnormal …

Ai for it operations (aiops) on cloud platforms: Reviews, opportunities and challenges

Q Cheng, D Sahoo, A Saha, W Yang, C Liu… - arxiv preprint arxiv …, 2023 - arxiv.org
Artificial Intelligence for IT operations (AIOps) aims to combine the power of AI with the big
data generated by IT Operations processes, particularly in cloud infrastructures, to provide …

Loggpt: Exploring chatgpt for log-based anomaly detection

J Qi, S Huang, Z Luan, S Yang, C Fung… - … Conference on High …, 2023 - ieeexplore.ieee.org
The increasing volume of log data produced by software-intensive systems makes it
impractical to analyze them manually. Many deep learning-based methods have been …

Deep learning or classical machine learning? an empirical study on log-based anomaly detection

B Yu, J Yao, Q Fu, Z Zhong, H **e, Y Wu… - Proceedings of the 46th …, 2024 - dl.acm.org
While deep learning (DL) has emerged as a powerful technique, its benefits must be
carefully considered in relation to computational costs. Specifically, although DL methods …