Bert-log: Anomaly detection for system logs based on pre-trained language model
Logs are primary information resource for fault diagnosis and anomaly detection in large-
scale computer systems, but it is hard to classify anomalies from system logs. Recent studies …
scale computer systems, but it is hard to classify anomalies from system logs. Recent studies …
[HTML][HTML] System log clustering approaches for cyber security applications: A survey
Log files give insight into the state of a computer system and enable the detection of
anomalous events relevant to cyber security. However, automatically analyzing log data is …
anomalous events relevant to cyber security. However, automatically analyzing log data is …
System log parsing: A survey
Modern information and communication systems have become increasingly challenging to
manage. The ubiquitous system logs contain plentiful information and are thus widely …
manage. The ubiquitous system logs contain plentiful information and are thus widely …
Software Failure Log Analysis for Engineers
The use of automated methods for log analysis is unavoidable in any large company;
therefore, it has attracted attention from engineers and researchers. As a result, the number …
therefore, it has attracted attention from engineers and researchers. As a result, the number …
LogNADS: Network anomaly detection scheme based on log semantics representation
X Liu, W Liu, X Di, J Li, B Cai, W Ren, H Yang - Future Generation …, 2021 - Elsevier
Abstract Semantics-aware anomaly detection based on log has attracted much attention.
However, the existing methods based on the weighted aggregation of all word vectors might …
However, the existing methods based on the weighted aggregation of all word vectors might …
A literature review and existing challenges on software logging practices: From the creation to the analysis of software logs
Software logging is the practice of recording different events and activities that occur within a
software system, which are useful for different activities such as failure prediction and …
software system, which are useful for different activities such as failure prediction and …
Towards NLP-based processing of honeypot logs
Honeypots are active sensors deployed to obtain information about attacks. In their search
for vulnerabilities, attackers generate large volumes of logs, whose analysis is time …
for vulnerabilities, attackers generate large volumes of logs, whose analysis is time …
Aarohi: Making real-time node failure prediction feasible
Large-scale production systems are well known to encounter node failures, which affect
compute capacity and energy. Both in HPC systems and enterprise data centers, combating …
compute capacity and energy. Both in HPC systems and enterprise data centers, combating …
Prefix-graph: A versatile log parsing approach merging prefix tree with probabilistic graph
Logs play an important part in analyzing system behavior and diagnosing system failures.
As the basic step of log analysis, log parsing converts raw log messages into structured log …
As the basic step of log analysis, log parsing converts raw log messages into structured log …
Semi-automated protocol disambiguation and code generation
For decades, Internet protocols have been specified using natural language. Given the
ambiguity inherent in such text, it is not surprising that protocol implementations have long …
ambiguity inherent in such text, it is not surprising that protocol implementations have long …