Bert-log: Anomaly detection for system logs based on pre-trained language model

S Chen, H Liao - Applied Artificial Intelligence, 2022 - Taylor & Francis
Logs are primary information resource for fault diagnosis and anomaly detection in large-
scale computer systems, but it is hard to classify anomalies from system logs. Recent studies …

[HTML][HTML] System log clustering approaches for cyber security applications: A survey

M Landauer, F Skopik, M Wurzenberger, A Rauber - Computers & Security, 2020 - Elsevier
Log files give insight into the state of a computer system and enable the detection of
anomalous events relevant to cyber security. However, automatically analyzing log data is …

System log parsing: A survey

T Zhang, H Qiu, G Castellano, M Rifai… - … on Knowledge and …, 2023 - ieeexplore.ieee.org
Modern information and communication systems have become increasingly challenging to
manage. The ubiquitous system logs contain plentiful information and are thus widely …

Software Failure Log Analysis for Engineers

W Dobrowolski, M Nikodem, O Unold - Electronics, 2023 - mdpi.com
The use of automated methods for log analysis is unavoidable in any large company;
therefore, it has attracted attention from engineers and researchers. As a result, the number …

LogNADS: Network anomaly detection scheme based on log semantics representation

X Liu, W Liu, X Di, J Li, B Cai, W Ren, H Yang - Future Generation …, 2021 - Elsevier
Abstract Semantics-aware anomaly detection based on log has attracted much attention.
However, the existing methods based on the weighted aggregation of all word vectors might …

A literature review and existing challenges on software logging practices: From the creation to the analysis of software logs

MA Batoun, M Sayagh, R Aghili, A Ouni, H Li - Empirical Software …, 2024 - Springer
Software logging is the practice of recording different events and activities that occur within a
software system, which are useful for different activities such as failure prediction and …

Towards NLP-based processing of honeypot logs

M Boffa, G Milan, L Vassio, I Drago… - 2022 IEEE European …, 2022 - ieeexplore.ieee.org
Honeypots are active sensors deployed to obtain information about attacks. In their search
for vulnerabilities, attackers generate large volumes of logs, whose analysis is time …

Aarohi: Making real-time node failure prediction feasible

A Das, F Mueller, B Rountree - 2020 IEEE International Parallel …, 2020 - ieeexplore.ieee.org
Large-scale production systems are well known to encounter node failures, which affect
compute capacity and energy. Both in HPC systems and enterprise data centers, combating …

Prefix-graph: A versatile log parsing approach merging prefix tree with probabilistic graph

G Chu, J Wang, Q Qi, H Sun, S Tao… - 2021 IEEE 37th …, 2021 - ieeexplore.ieee.org
Logs play an important part in analyzing system behavior and diagnosing system failures.
As the basic step of log analysis, log parsing converts raw log messages into structured log …

Semi-automated protocol disambiguation and code generation

J Yen, T Lévai, Q Ye, X Ren, R Govindan… - Proceedings of the …, 2021 - dl.acm.org
For decades, Internet protocols have been specified using natural language. Given the
ambiguity inherent in such text, it is not surprising that protocol implementations have long …