Improving Log-Based Anomaly Detection with Component-Aware Analysis
暂无分享,去创建一个
Dan Yang | Xiaohong Zhang | Meng Yan | Zhao Li | Ling Xu | Zhou Xu | Kun Yin | Zhou Xu | Meng Yan | Xiaohong Zhang | Dan Yang | Z. Li | Ling Xu | Kun Yin
[1] Feifei Li,et al. DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning , 2017, CCS.
[2] Anand Sivasubramaniam,et al. Failure Prediction in IBM BlueGene/L Event Logs , 2007, Seventh IEEE International Conference on Data Mining (ICDM 2007).
[3] Shilin He,et al. Experience Report: System Log Analysis for Anomaly Detection , 2016, 2016 IEEE 27th International Symposium on Software Reliability Engineering (ISSRE).
[4] Qiang Fu,et al. Mining Invariants from Console Logs for System Problem Detection , 2010, USENIX Annual Technical Conference.
[5] Zibin Zheng,et al. Tools and Benchmarks for Automated Log Parsing , 2018, 2019 IEEE/ACM 41st International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP).
[6] Zibin Zheng,et al. Drain: An Online Log Parsing Approach with Fixed Depth Tree , 2017, 2017 IEEE International Conference on Web Services (ICWS).
[7] Xiao Yu,et al. CloudSeer: Workflow Monitoring of Cloud Infrastructures via Interleaved Logs , 2016, ASPLOS.
[8] Yu Zhang,et al. Log Clustering Based Problem Identification for Online Service Systems , 2016, 2016 IEEE/ACM 38th International Conference on Software Engineering Companion (ICSE-C).
[9] Guofei Jiang,et al. LogMine: Fast Pattern Recognition for Log Analytics , 2016, CIKM.
[10] Jon Stearley,et al. What Supercomputers Say: A Study of Five System Logs , 2007, 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07).
[11] Gargi Dasgupta,et al. Anomaly Detection Using Program Control Flow Graph Mining From Execution Logs , 2016, KDD.
[12] Shenglin Zhang,et al. LogAnomaly: Unsupervised Detection of Sequential and Quantitative Anomalies in Unstructured Logs , 2019, IJCAI.
[13] Alexander Aiken,et al. Alert Detection in System Logs , 2008, 2008 Eighth IEEE International Conference on Data Mining.
[14] Jian Cao,et al. Behavioral anomaly detection approach based on log monitoring , 2015, 2015 International Conference on Behavioral, Economic and Socio-cultural Computing (BESC).
[15] Feifei Li,et al. Spell: Online Streaming Parsing of Large Unstructured System Logs , 2019, IEEE Transactions on Knowledge and Data Engineering.
[16] Keiichi Shima,et al. Length Matters: Clustering System Log Messages using Length of Words , 2016, ArXiv.
[17] Qiang Fu,et al. Contextual analysis of program logs for understanding system behaviors , 2013, 2013 10th Working Conference on Mining Software Repositories (MSR).
[18] Michael I. Jordan,et al. Failure diagnosis using decision trees , 2004 .
[19] Alexander Aiken,et al. Using correlated surprise to infer shared influence , 2010, 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN).
[20] Xu Zhang,et al. Robust log-based anomaly detection on unstable log data , 2019, ESEC/SIGSOFT FSE.
[21] Michael I. Jordan,et al. Detecting large-scale system problems by mining console logs , 2009, SOSP '09.
[22] Yong Wang,et al. An Experience Report of Generating Load Tests Using Log-Recovered Workloads at Varying Granularities of User Behaviour , 2019, 2019 34th IEEE/ACM International Conference on Automated Software Engineering (ASE).