A survey on automated log analysis for reliability engineering
Logs are semi-structured text generated by logging statements in software source code. In
recent decades, software logs have become imperative in the reliability assurance …
recent decades, software logs have become imperative in the reliability assurance …
Anatomy of threats to the internet of things
The world is resorting to the Internet of Things (IoT) for ease of control and monitoring of
smart devices. The ubiquitous use of IoT ranges from industrial control systems (ICS) to e …
smart devices. The ubiquitous use of IoT ranges from industrial control systems (ICS) to e …
Tools and benchmarks for automated log parsing
Logs are imperative in the development and maintenance process of many software
systems. They record detailed runtime information that allows developers and support …
systems. They record detailed runtime information that allows developers and support …
Experience report: System log analysis for anomaly detection
Anomaly detection plays an important role in management of modern large-scale distributed
systems. Logs, which record system runtime information, are widely used for anomaly …
systems. Logs, which record system runtime information, are widely used for anomaly …
Hitanomaly: Hierarchical transformers for anomaly detection in system log
Enterprise systems often produce a large volume of logs to record runtime status and events.
Anomaly detection from system logs is crucial for service management and system …
Anomaly detection from system logs is crucial for service management and system …
Knowledge-defined networking
The research community has considered in the past the application of Artificial Intelligence
(AI) techniques to control and operate networks. A notable example is the Knowledge Plane …
(AI) techniques to control and operate networks. A notable example is the Knowledge Plane …
Twenty security considerations for cloud-supported Internet of Things
To realize the broad vision of pervasive computing, underpinned by the “Internet of
Things”(IoT), it is essential to break down application and technology-based silos and …
Things”(IoT), it is essential to break down application and technology-based silos and …
Pivot tracing: Dynamic causal monitoring for distributed systems
Monitoring and troubleshooting distributed systems is notoriously difficult; potential problems
are complex, varied, and unpredictable. The monitoring and diagnosis tools commonly used …
are complex, varied, and unpredictable. The monitoring and diagnosis tools commonly used …
Logram: Efficient Log Parsing Using -Gram Dictionaries
Software systems usually record important runtime information in their logs. Logs help
practitioners understand system runtime behaviors and diagnose field failures. As logs are …
practitioners understand system runtime behaviors and diagnose field failures. As logs are …
AutoLog: Anomaly detection by deep autoencoding of system logs
The use of system logs for detecting and troubleshooting anomalies of production systems
has been known since the early days of computers. In spite of the advances in the area, the …
has been known since the early days of computers. In spite of the advances in the area, the …