A survey on explainable anomaly detection
In the past two decades, most research on anomaly detection has focused on improving the
accuracy of the detection, while largely ignoring the explainability of the corresponding …
accuracy of the detection, while largely ignoring the explainability of the corresponding …
Trustworthy AI-based Performance Diagnosis Systems for Cloud Applications: A Review
Performance diagnosis systems are defined as detecting abnormal performance
phenomena and play a crucial role in cloud applications. An effective performance …
phenomena and play a crucial role in cloud applications. An effective performance …
LogPal: A generic anomaly detection scheme of heterogeneous logs for network systems
L Sun, X Xu - Security and Communication Networks, 2023 - Wiley Online Library
As a key resource for diagnosing and identifying problems, network syslog contains vast
quantities of information. And it is the main source of data for anomaly detection of systems …
quantities of information. And it is the main source of data for anomaly detection of systems …
Trustworthy anomaly detection: A survey
Anomaly detection has a wide range of real-world applications, such as bank fraud detection
and cyber intrusion detection. In the past decade, a variety of anomaly detection models …
and cyber intrusion detection. In the past decade, a variety of anomaly detection models …
Explainable sequential anomaly detection via prototypes
Sequential anomaly detection has received more and more attention because of its wide
applications in various domains, such as debugging system failures via logs. Researchers …
applications in various domains, such as debugging system failures via logs. Researchers …
Abnormal event detection via hypergraph contrastive learning
Abnormal event detection, which refers to mining unusual interactions among involved
entities, plays an important role in many real applications. Previous works mostly …
entities, plays an important role in many real applications. Previous works mostly …
[PDF][PDF] Log Anomaly Detection Based on Hierarchical Graph Neural Network and Label Contrastive Coding.
System logs are essential for detecting anomalies, querying faults, and tracing attacks.
Because of the time-consuming and labor-intensive nature of manual system …
Because of the time-consuming and labor-intensive nature of manual system …
Landscape and Taxonomy of Online Parser-Supported Log Anomaly Detection Methods
As production system estates become larger and more complex, ensuring stability through
traditional monitoring approaches becomes more challenging. Rule-based monitoring is …
traditional monitoring approaches becomes more challenging. Rule-based monitoring is …
Achieving Counterfactual Explanation for Sequence Anomaly Detection
Anomaly detection on discrete sequential data has been investigated for a long time
because of its potential in various applications, such as detecting novel attacks or abnormal …
because of its potential in various applications, such as detecting novel attacks or abnormal …
MDAP: Module Dependency based Anomaly Prediction
In large-scale distributed systems with multiple interconnected modules, failure of even a
single module might have a cascading effect and might result in overall system failure …
single module might have a cascading effect and might result in overall system failure …