A survey on automated log analysis for reliability engineering

S He, P He, Z Chen, T Yang, Y Su, MR Lyu - ACM computing surveys …, 2021 - dl.acm.org
Logs are semi-structured text generated by logging statements in software source code. In
recent decades, software logs have become imperative in the reliability assurance …

Anatomy of threats to the internet of things

I Makhdoom, M Abolhasan, J Lipman… - … surveys & tutorials, 2018 - ieeexplore.ieee.org
The world is resorting to the Internet of Things (IoT) for ease of control and monitoring of
smart devices. The ubiquitous use of IoT ranges from industrial control systems (ICS) to e …

Tools and benchmarks for automated log parsing

J Zhu, S He, J Liu, P He, Q **e… - 2019 IEEE/ACM 41st …, 2019 - ieeexplore.ieee.org
Logs are imperative in the development and maintenance process of many software
systems. They record detailed runtime information that allows developers and support …

Experience report: System log analysis for anomaly detection

S He, J Zhu, P He, MR Lyu - 2016 IEEE 27th international …, 2016 - ieeexplore.ieee.org
Anomaly detection plays an important role in management of modern large-scale distributed
systems. Logs, which record system runtime information, are widely used for anomaly …

Hitanomaly: Hierarchical transformers for anomaly detection in system log

S Huang, Y Liu, C Fung, R He, Y Zhao… - IEEE transactions on …, 2020 - ieeexplore.ieee.org
Enterprise systems often produce a large volume of logs to record runtime status and events.
Anomaly detection from system logs is crucial for service management and system …

Knowledge-defined networking

A Mestres, A Rodriguez-Natal, J Carner… - ACM SIGCOMM …, 2017 - dl.acm.org
The research community has considered in the past the application of Artificial Intelligence
(AI) techniques to control and operate networks. A notable example is the Knowledge Plane …

Twenty security considerations for cloud-supported Internet of Things

J Singh, T Pasquier, J Bacon, H Ko… - IEEE Internet of things …, 2015 - ieeexplore.ieee.org
To realize the broad vision of pervasive computing, underpinned by the “Internet of
Things”(IoT), it is essential to break down application and technology-based silos and …

Pivot tracing: Dynamic causal monitoring for distributed systems

J Mace, R Roelke, R Fonseca - ACM Transactions on Computer Systems …, 2018 - dl.acm.org
Monitoring and troubleshooting distributed systems is notoriously difficult; potential problems
are complex, varied, and unpredictable. The monitoring and diagnosis tools commonly used …

Logram: Efficient Log Parsing Using -Gram Dictionaries

H Dai, H Li, CS Chen, W Shang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Software systems usually record important runtime information in their logs. Logs help
practitioners understand system runtime behaviors and diagnose field failures. As logs are …

AutoLog: Anomaly detection by deep autoencoding of system logs

M Catillo, A Pecchia, U Villano - Expert Systems with Applications, 2022 - Elsevier
The use of system logs for detecting and troubleshooting anomalies of production systems
has been known since the early days of computers. In spite of the advances in the area, the …