[PDF][PDF] Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation.

D Han, Z Wang, W Chen, K Wang, R Yu, S Wang… - NDSS, 2023 - ndss-symposium.org
Concept drift is one of the most frustrating challenges for learning-based security
applications built on the closeworld assumption of identical distribution between training and …

Landscape of automated log analysis: A systematic literature review and map** study

Ł Korzeniowski, K Goczyła - IEEE Access, 2022 - ieeexplore.ieee.org
Logging is a common practice in software engineering to provide insights into working
systems. The main uses of log files have always been failure identification and root cause …

On the effectiveness of log representation for log-based anomaly detection

X Wu, H Li, F Khomh - Empirical Software Engineering, 2023 - Springer
Logs are an essential source of information for people to understand the running status of a
software system. Due to the evolving modern software architecture and maintenance …

Logstamp: Automatic online log parsing based on sequence labelling

S Tao, W Meng, Y Cheng, Y Zhu, Y Liu, C Du… - ACM SIGMETRICS …, 2022 - dl.acm.org
Logs are one of the most critical data for service management. It contains rich runtime
information for both services and users. Since size of logs are often enormous in size and …

Putracead: Trace anomaly detection with partial labels based on gnn and pu learning

K Zhang, C Zhang, X Peng… - 2022 IEEE 33rd …, 2022 - ieeexplore.ieee.org
Distributed tracing has been an important part of microservice infrastructure and learning-
based trace analysis has been used to detect anomalies in microservice systems. Existing …

Semi-supervised and unsupervised anomaly detection by mining numerical workflow relations from system logs

B Zhang, H Zhang, VH Le, P Moscato… - Automated Software …, 2023 - Springer
Large-scale software-intensive systems often generate logs for troubleshooting purpose.
The system logs are semi-structured text messages that record the internal status of a …

Evlog: Identifying anomalous logs over software evolution

Y Huo, C Lee, Y Su, S Shan, J Liu… - 2023 IEEE 34th …, 2023 - ieeexplore.ieee.org
Software logs record system activities, aiding maintainers in identifying the underlying
causes for failures and enabling prompt mitigation actions. However, maintainers need to …

Logonline: A semi-supervised log-based anomaly detector aided with online learning mechanism

X Wang, J Song, X Zhang, J Tang… - 2023 38th IEEE/ACM …, 2023 - ieeexplore.ieee.org
Logs are prevalent in modern cloud systems and serve as a valuable source of information
for system maintenance. Over the years, a lot of research and industrial efforts have been …

Logst: Log semi-supervised anomaly detection based on sentence-bert

M Zhang, J Chen, J Liu, J Wang, R Shi… - 2022 7th International …, 2022 - ieeexplore.ieee.org
Semantics extraction is a very important part in the field of log anomaly detection, how to
accurately obtain the semantics representation of log events will have a direct impact on the …

Literature review on log anomaly detection approaches utilizing online parsing methodology

S Lupton, H Washizaki, N Yoshioka… - 2021 28th Asia …, 2021 - ieeexplore.ieee.org
The use of anomaly detection for log monitoring requires parsing model input features from
raw, unstructured data. Log parsing methods come in many forms, but are generally …