An online log template extraction method based on hierarchical clustering

The raw log messages record extremely rich system, network, and application running dynamic information that is a good data source for abnormal detection. Log template extraction is an important prerequisite for log sequence anomaly detection. The problems of the existing log template extraction met...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:EURASIP journal on wireless communications and networking Jg. 2019; H. 1; S. 1 - 12
Hauptverfasser: Yang, Ruipeng, Qu, Dan, Qian, Yekui, Dai, Yusheng, Zhu, Shaowei
Format: Journal Article
Sprache:Englisch
Veröffentlicht: Cham Springer International Publishing 28.05.2019
Springer Nature B.V
SpringerOpen
Schlagworte:
ISSN:1687-1499, 1687-1472, 1687-1499
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Abstract The raw log messages record extremely rich system, network, and application running dynamic information that is a good data source for abnormal detection. Log template extraction is an important prerequisite for log sequence anomaly detection. The problems of the existing log template extraction methods are mostly offline, and the few online methods have insufficient F1-score in multi-source log data. In view of the shortcomings of the existing methods, an online log template extraction method called LogOHC is proposed. Firstly, the raw log messages are preprocessed, and the word distributed representation (word2vec) is used to vectorize the log messages online. Then, the online hierarchical clustering algorithm is applied, and finally, log templates are generated. The experimental analysis shows that LogOHC has a higher F1-score than the existing log template extraction methods, is suitable for multi-source log data sets, and has a shorter single-step execution time, which can meet the requirements of online real-time processing.
AbstractList The raw log messages record extremely rich system, network, and application running dynamic information that is a good data source for abnormal detection. Log template extraction is an important prerequisite for log sequence anomaly detection. The problems of the existing log template extraction methods are mostly offline, and the few online methods have insufficient F1-score in multi-source log data. In view of the shortcomings of the existing methods, an online log template extraction method called LogOHC is proposed. Firstly, the raw log messages are preprocessed, and the word distributed representation (word2vec) is used to vectorize the log messages online. Then, the online hierarchical clustering algorithm is applied, and finally, log templates are generated. The experimental analysis shows that LogOHC has a higher F1-score than the existing log template extraction methods, is suitable for multi-source log data sets, and has a shorter single-step execution time, which can meet the requirements of online real-time processing.
Abstract The raw log messages record extremely rich system, network, and application running dynamic information that is a good data source for abnormal detection. Log template extraction is an important prerequisite for log sequence anomaly detection. The problems of the existing log template extraction methods are mostly offline, and the few online methods have insufficient F1-score in multi-source log data. In view of the shortcomings of the existing methods, an online log template extraction method called LogOHC is proposed. Firstly, the raw log messages are preprocessed, and the word distributed representation (word2vec) is used to vectorize the log messages online. Then, the online hierarchical clustering algorithm is applied, and finally, log templates are generated. The experimental analysis shows that LogOHC has a higher F1-score than the existing log template extraction methods, is suitable for multi-source log data sets, and has a shorter single-step execution time, which can meet the requirements of online real-time processing.
ArticleNumber 135
Author Qu, Dan
Zhu, Shaowei
Dai, Yusheng
Qian, Yekui
Yang, Ruipeng
Author_xml – sequence: 1
  givenname: Ruipeng
  orcidid: 0000-0002-7373-393X
  surname: Yang
  fullname: Yang, Ruipeng
  email: yangruipeng-@163.com
  organization: PLA Strategic Support Force Information Engineering University
– sequence: 2
  givenname: Dan
  surname: Qu
  fullname: Qu, Dan
  organization: PLA Strategic Support Force Information Engineering University
– sequence: 3
  givenname: Yekui
  surname: Qian
  fullname: Qian, Yekui
  email: qyk1129@163.com
– sequence: 4
  givenname: Yusheng
  surname: Dai
  fullname: Dai, Yusheng
  organization: Northwestern Polytechnical University
– sequence: 5
  givenname: Shaowei
  surname: Zhu
  fullname: Zhu, Shaowei
BookMark eNp9UU2LFDEUDLKCu6s_wFuD517z1UnnuCx-DCx40XN4Sb_MZOjpjEkG9N-bthVFcE8vL1TVK6puyNWSFiTkNaN3jI3qbWFCibGnzPRMCtrLZ-SaqVG3zZirv94vyE0pR0qFkIZfk9390qVljgt2c9p3FU_nGSp2-K1m8DWmpTthPaSpc1BwatjuEDFD9ofoYe78fCkVc1z2L8nzAHPBV7_mLfny_t3nh4_946cPu4f7x95LPtReeu4o18FrKZwyoKT3zuAQIGgKSmkzGgoGgpMaWAg86MHgpEZngjGCiVuy23SnBEd7zvEE-btNEO3Pj5T3FnKNfkarh4kiOseEAylBGd4O-UGPbrVgoGm92bTOOX29YKn2mC55afYt54JxIyTjDaU3lM-plIzB-lhhzaZlFGfLqF07sFsHtnVg1w6sbEz2D_O336c4fOOU8xor5j-e_k_6Acoamxc
CitedBy_id crossref_primary_10_3233_IDA_230133
crossref_primary_10_1109_TKDE_2022_3222417
crossref_primary_10_1007_s11390_021_1691_3
crossref_primary_10_1109_ACCESS_2019_2953981
crossref_primary_10_1109_ACCESS_2024_3387287
crossref_primary_10_1007_s10664_024_10452_w
crossref_primary_10_3390_app13137668
Cites_doi 10.1016/j.compind.2018.01.018
10.1016/j.diin.2018.09.006
10.1007/978-3-662-46578-3_53
10.1109/TDSC.2017.2762673
10.1109/TETC.2016.2520883
10.1109/TKDE.2011.138
10.1007/s10916-018-0904-y
10.1007/s11042-017-4537-9
10.1007/978-3-319-46298-1_32
10.1016/j.jde.2017.02.010
10.1109/ICWS.2017.13
10.1109/IACC.2016.141
10.1109/ICDM.2010.76
10.1109/DSN.2016.66
10.1145/1102351.1102389
10.1109/ICDM.2009.60
10.1145/3133956.3134015
10.1145/2063576.2063690
10.1145/2568225.2568246
10.1109/DSN.2015.14
10.1007/s00500-018-3608-9
10.1109/ICDM.2016.0103
10.1145/2939672.2939712
ContentType Journal Article
Copyright The Author(s). 2019
EURASIP Journal on Wireless Communications and Networking is a copyright of Springer, (2019). All Rights Reserved. © 2019. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Copyright_xml – notice: The Author(s). 2019
– notice: EURASIP Journal on Wireless Communications and Networking is a copyright of Springer, (2019). All Rights Reserved. © 2019. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
DBID C6C
AAYXX
CITATION
3V.
7SC
7SP
7XB
8AL
8FD
8FE
8FG
8FK
ABUWG
AFKRA
ARAPS
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
GNUQQ
HCIFZ
JQ2
K7-
L7M
L~C
L~D
M0N
P5Z
P62
PHGZM
PHGZT
PIMPY
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
Q9U
DOA
DOI 10.1186/s13638-019-1430-4
DatabaseName Springer Nature OA Free Journals
CrossRef
ProQuest Central (Corporate)
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
ProQuest Central (purchase pre-March 2016)
Computing Database (Alumni Edition)
Technology Research Database
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central (Alumni) (purchase pre-March 2016)
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
Health Research Premium Collection
ProQuest Central Essentials
ProQuest Central (subscription)
Technology collection
ProQuest One Community College
ProQuest Central
ProQuest Central Student
SciTech Premium Collection
ProQuest Computer Science Collection
Computer Science Database
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
Computing Database
AAdvanced Technologies & Aerospace Database (subscription)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Premium
ProQuest One Academic
Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
One Applied & Life Sciences
ProQuest One Academic (retired)
ProQuest One Academic UKI Edition
ProQuest Central China
ProQuest Central Basic
Directory of Open Access Journals (DOAJ)
DatabaseTitle CrossRef
Publicly Available Content Database
Computer Science Database
ProQuest Central Student
Technology Collection
Technology Research Database
Computer and Information Systems Abstracts – Academic
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
ProQuest Central China
ProQuest Central
ProQuest One Applied & Life Sciences
ProQuest Central Korea
ProQuest Central (New)
Advanced Technologies Database with Aerospace
Advanced Technologies & Aerospace Collection
ProQuest Computing
ProQuest Central Basic
ProQuest Computing (Alumni Edition)
ProQuest One Academic Eastern Edition
Electronics & Communications Abstracts
ProQuest Technology Collection
ProQuest SciTech Collection
Computer and Information Systems Abstracts Professional
Advanced Technologies & Aerospace Database
ProQuest One Academic UKI Edition
ProQuest One Academic
ProQuest One Academic (New)
ProQuest Central (Alumni)
DatabaseTitleList
Publicly Available Content Database

Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: PIMPY
  name: Publicly Available Content Database
  url: http://search.proquest.com/publiccontent
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1687-1499
EndPage 12
ExternalDocumentID oai_doaj_org_article_75d0eebb13ba44a6929e5c578bb0279a
10_1186_s13638_019_1430_4
GrantInformation_xml – fundername: Science and Technology on Information Transmission and Dissemination in Communication
GroupedDBID -A0
.4S
.DC
0R~
29G
2WC
3V.
4.4
40G
5GY
5VS
6OB
8FE
8FG
8R4
8R5
AAFWJ
AAJSJ
AAKKN
AAKPC
ABDBF
ABEEZ
ABFTD
ABUWG
ACACY
ACGFS
ACUHS
ACULB
ADBBV
ADDVE
ADINQ
ADMLS
AENEX
AFGXO
AFKRA
AFPKN
AHBYD
AHYZX
ALMA_UNASSIGNED_HOLDINGS
AMKLP
ARAPS
ARCSS
AZQEC
BCNDV
BENPR
BGLVJ
BPHCQ
C24
C6C
CCPQU
CS3
DU5
DWQXO
E3Z
EAD
EAP
EAS
EBLON
EBS
EDO
EJD
EMK
ESX
GNUQQ
GROUPED_DOAJ
HCIFZ
HZ~
I-F
K6V
K7-
KQ8
M0N
M~E
OK1
P2P
P62
PIMPY
PQQKQ
PROAC
Q2X
RHU
RNS
RSV
SEG
SOJ
TUS
U2A
XSB
AASML
AAYXX
CITATION
OVT
7SC
7SP
7XB
8AL
8FD
8FK
JQ2
L7M
L~C
L~D
PHGZM
PHGZT
PKEHL
PQEST
PQGLB
PQUKI
PRINS
Q9U
ID FETCH-LOGICAL-c425t-4c2b027fc743b69a64ccb9e5faf70a6679890a9afb47a1ff2f759ed68b9f99313
IEDL.DBID C24
ISICitedReferencesCount 15
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000469495600005&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1687-1499
1687-1472
IngestDate Fri Oct 03 12:44:00 EDT 2025
Sat Oct 11 05:47:47 EDT 2025
Sat Nov 29 01:43:52 EST 2025
Tue Nov 18 21:43:34 EST 2025
Fri Feb 21 02:35:33 EST 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 1
Keywords Log template extraction
Online vectorization
Log anomaly detection
Online hierarchical clustering
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c425t-4c2b027fc743b69a64ccb9e5faf70a6679890a9afb47a1ff2f759ed68b9f99313
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-7373-393X
OpenAccessLink https://link.springer.com/10.1186/s13638-019-1430-4
PQID 2231293412
PQPubID 237293
PageCount 12
ParticipantIDs doaj_primary_oai_doaj_org_article_75d0eebb13ba44a6929e5c578bb0279a
proquest_journals_2231293412
crossref_citationtrail_10_1186_s13638_019_1430_4
crossref_primary_10_1186_s13638_019_1430_4
springer_journals_10_1186_s13638_019_1430_4
PublicationCentury 2000
PublicationDate 2019-05-28
PublicationDateYYYYMMDD 2019-05-28
PublicationDate_xml – month: 05
  year: 2019
  text: 2019-05-28
  day: 28
PublicationDecade 2010
PublicationPlace Cham
PublicationPlace_xml – name: Cham
– name: New York
PublicationTitle EURASIP journal on wireless communications and networking
PublicationTitleAbbrev J Wireless Com Network
PublicationYear 2019
Publisher Springer International Publishing
Springer Nature B.V
SpringerOpen
Publisher_xml – name: Springer International Publishing
– name: Springer Nature B.V
– name: SpringerOpen
References CR19
CR18
CR17
CR16
CR15
CR14
Kobren, Monath, Krishnamurthy, McCallum (CR32) 2017
CR36
CR13
CR35
Kim, Shin, Shin, Kim (CR9) 2018; 2018
CR11
Dai, Li, Qian, Lu (CR1) 2018; 27
CR30
Nagaraj, Killian, Neville (CR10) 2012
Xu, Wang, Wang, Li (CR28) 2018; 77
Yuchong, Xingguo, Yekui, Xin (CR2) 2015; 2015
Zhu, He, Liu, He, Xie, Zheng, Lyu (CR33) 2018
Makanju, Zincir-Heywood, Milios (CR12) 2012; 24
He, Zhu, He, Li, Lyu (CR34) 2018; 15
Xu, Li, Li, Liu (CR31) 2018; 42
CR4
Breier, Branišová (CR29) 2015
CR3
CR5
CR7
Nagashree, Tejasvi, Swathi (CR8) 2018; 97
Sun, Fu, Zhu, Li, Lu (CR27) 2016; 4
CR25
CR24
CR22
CR20
Peihe, Dekai (CR26) 2017; 262
Liu, Li, Li, Xu (CR23) 2015
Rahman, Xu, Radke, Foo (CR6) 2016
Wickramage, Fidge, Sahama, Daly, Wong (CR21) 2017
Y Dai (1430_CR1) 2018; 27
1430_CR19
1430_CR18
1430_CR17
1430_CR16
1430_CR15
1430_CR14
1430_CR36
1430_CR13
A Kobren (1430_CR32) 2017
1430_CR35
S Liu (1430_CR23) 2015
Q Xu (1430_CR28) 2018; 77
Q Xu (1430_CR31) 2018; 42
W Peihe (1430_CR26) 2017; 262
1430_CR3
A Makanju (1430_CR12) 2012; 24
1430_CR5
A Rahman (1430_CR6) 2016
1430_CR4
1430_CR11
L Yuchong (1430_CR2) 2015; 2015
K Nagaraj (1430_CR10) 2012
P He (1430_CR34) 2018; 15
1430_CR7
D Sun (1430_CR27) 2016; 4
1430_CR30
N Nagashree (1430_CR8) 2018; 97
D Kim (1430_CR9) 2018; 2018
1430_CR25
1430_CR24
J Zhu (1430_CR33) 2018
C Wickramage (1430_CR21) 2017
1430_CR22
J Breier (1430_CR29) 2015
1430_CR20
References_xml – ident: CR22
– volume: 97
  start-page: 24
  year: 2018
  end-page: 33
  ident: CR8
  article-title: An early risk detection and management system for the cloud with log parser
  publication-title: Comput. Ind.
  doi: 10.1016/j.compind.2018.01.018
– volume: 27
  start-page: 30
  year: 2018
  end-page: 37
  ident: CR1
  article-title: A malware classification method based on memory dump grayscale image
  publication-title: Digit. Investig.
  doi: 10.1016/j.diin.2018.09.006
– ident: CR18
– ident: CR4
– ident: CR14
– year: 2017
  ident: CR21
  publication-title: Preserving Privacy through Log Analysis in Health Information Systems
– start-page: 449
  year: 2015
  end-page: 457
  ident: CR29
  article-title: Anomaly detection from log files using data mining techniques
  publication-title: Information Science and Applications
  doi: 10.1007/978-3-662-46578-3_53
– ident: CR16
– ident: CR30
– volume: 15
  start-page: 931
  issue: 6
  year: 2018
  end-page: 944
  ident: CR34
  article-title: Towards automated log parsing for large-scale log data analysis
  publication-title: IEEE Trans Dependable Secure Comput.
  doi: 10.1109/TDSC.2017.2762673
– start-page: e4892
  year: 2015
  ident: CR23
  article-title: Research of animals image semantic segmentation based on deep learning
  publication-title: Concurrency and Computation: Practice and Experience
– year: 2017
  ident: CR32
  publication-title: An Online Hierarchical Algorithm for Extreme Clustering
– volume: 4
  start-page: 278
  issue: 2
  year: 2016
  end-page: 289
  ident: CR27
  article-title: Non-intrusive anomaly detection with streaming performance metrics and logs for DevOps in public clouds: a case study in AWS
  publication-title: IEEE Trans. Emerg. Top. Comput.
  doi: 10.1109/TETC.2016.2520883
– year: 2018
  ident: CR33
  publication-title: Tools and Benchmarks for Automated Log Parsing
– ident: CR35
– volume: 2015
  start-page: 1
  year: 2015
  end-page: 26
  ident: CR2
  article-title: Network-wide traffic anomaly detection and localization based on robust multivariate probabilistic calibration model
  publication-title: Math. Probl. Eng.
– ident: CR25
– ident: CR19
– ident: CR3
– ident: CR15
– ident: CR17
– volume: 2018
  start-page: 1
  year: 2018
  end-page: 9
  ident: CR9
  article-title: Attack detection application with attack tree for mobile system using log analysis
  publication-title: Mob Netw App.
– volume: 24
  start-page: 1921
  issue: 11
  year: 2012
  end-page: 1936
  ident: CR12
  article-title: A lightweight algorithm for message type extraction in system application logs
  publication-title: IEEE Trans. Knowl. Data Eng.
  doi: 10.1109/TKDE.2011.138
– ident: CR13
– ident: CR11
– year: 2012
  ident: CR10
  article-title: Structured comparative analysis of systems logs to diagnose performance problems
  publication-title: Proc. USENIX Symposium on Networked Systems Design and Implementation (NSDI)
– volume: 42
  start-page: 49
  issue: 3
  year: 2018
  ident: CR31
  article-title: Energy spectrum CT image detection based dimensionality reduction with phase congruency
  publication-title: J Med Syst.
  doi: 10.1007/s10916-018-0904-y
– volume: 77
  start-page: 6311
  issue: 5
  year: 2018
  end-page: 6326
  ident: CR28
  article-title: Thermal comfort research on human CT data modeling
  publication-title: Multimed. Tools Appl.
  doi: 10.1007/s11042-017-4537-9
– ident: CR36
– ident: CR5
– start-page: 499
  year: 2016
  end-page: 506
  ident: CR6
  article-title: Finding anomalies in SCADA logs using rare sequential pattern mining
  publication-title: International Conference on Network and System Security
  doi: 10.1007/978-3-319-46298-1_32
– ident: CR7
– volume: 262
  start-page: 5534
  year: 2017
  end-page: 5564
  ident: CR26
  article-title: Convexity of level sets of minimal graph on space form with nonnegative curvature
  publication-title: J Diff Equ.
  doi: 10.1016/j.jde.2017.02.010
– ident: CR24
– ident: CR20
– ident: 1430_CR14
  doi: 10.1109/ICWS.2017.13
– ident: 1430_CR24
  doi: 10.1109/IACC.2016.141
– volume: 27
  start-page: 30
  year: 2018
  ident: 1430_CR1
  publication-title: Digit. Investig.
  doi: 10.1016/j.diin.2018.09.006
– ident: 1430_CR15
  doi: 10.1109/ICDM.2010.76
– volume: 77
  start-page: 6311
  issue: 5
  year: 2018
  ident: 1430_CR28
  publication-title: Multimed. Tools Appl.
  doi: 10.1007/s11042-017-4537-9
– volume: 262
  start-page: 5534
  year: 2017
  ident: 1430_CR26
  publication-title: J Diff Equ.
  doi: 10.1016/j.jde.2017.02.010
– ident: 1430_CR35
  doi: 10.1109/DSN.2016.66
– ident: 1430_CR36
  doi: 10.1145/1102351.1102389
– volume-title: Preserving Privacy through Log Analysis in Health Information Systems
  year: 2017
  ident: 1430_CR21
– ident: 1430_CR25
– start-page: 449
  volume-title: Information Science and Applications
  year: 2015
  ident: 1430_CR29
  doi: 10.1007/978-3-662-46578-3_53
– ident: 1430_CR20
  doi: 10.1109/ICDM.2009.60
– volume-title: Proc. USENIX Symposium on Networked Systems Design and Implementation (NSDI)
  year: 2012
  ident: 1430_CR10
– volume-title: Tools and Benchmarks for Automated Log Parsing
  year: 2018
  ident: 1430_CR33
– ident: 1430_CR5
  doi: 10.1145/3133956.3134015
– ident: 1430_CR18
  doi: 10.1145/2063576.2063690
– ident: 1430_CR16
– volume: 15
  start-page: 931
  issue: 6
  year: 2018
  ident: 1430_CR34
  publication-title: IEEE Trans Dependable Secure Comput.
  doi: 10.1109/TDSC.2017.2762673
– volume: 2015
  start-page: 1
  year: 2015
  ident: 1430_CR2
  publication-title: Math. Probl. Eng.
– start-page: e4892
  volume-title: Concurrency and Computation: Practice and Experience
  year: 2015
  ident: 1430_CR23
– ident: 1430_CR19
  doi: 10.1145/2568225.2568246
– ident: 1430_CR3
– ident: 1430_CR7
  doi: 10.1109/DSN.2015.14
– ident: 1430_CR22
  doi: 10.1007/s00500-018-3608-9
– volume: 4
  start-page: 278
  issue: 2
  year: 2016
  ident: 1430_CR27
  publication-title: IEEE Trans. Emerg. Top. Comput.
  doi: 10.1109/TETC.2016.2520883
– volume: 97
  start-page: 24
  year: 2018
  ident: 1430_CR8
  publication-title: Comput. Ind.
  doi: 10.1016/j.compind.2018.01.018
– start-page: 499
  volume-title: International Conference on Network and System Security
  year: 2016
  ident: 1430_CR6
  doi: 10.1007/978-3-319-46298-1_32
– volume: 24
  start-page: 1921
  issue: 11
  year: 2012
  ident: 1430_CR12
  publication-title: IEEE Trans. Knowl. Data Eng.
  doi: 10.1109/TKDE.2011.138
– volume: 2018
  start-page: 1
  year: 2018
  ident: 1430_CR9
  publication-title: Mob Netw App.
– ident: 1430_CR13
  doi: 10.1109/ICDM.2016.0103
– volume: 42
  start-page: 49
  issue: 3
  year: 2018
  ident: 1430_CR31
  publication-title: J Med Syst.
  doi: 10.1007/s10916-018-0904-y
– ident: 1430_CR4
  doi: 10.1145/2939672.2939712
– volume-title: An Online Hierarchical Algorithm for Extreme Clustering
  year: 2017
  ident: 1430_CR32
– ident: 1430_CR30
– ident: 1430_CR17
– ident: 1430_CR11
SSID ssj0033492
Score 2.257435
Snippet The raw log messages record extremely rich system, network, and application running dynamic information that is a good data source for abnormal detection. Log...
Abstract The raw log messages record extremely rich system, network, and application running dynamic information that is a good data source for abnormal...
SourceID doaj
proquest
crossref
springer
SourceType Open Website
Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 1
SubjectTerms Algorithms
Anomalies
Cluster analysis
Clustering
Communications Engineering
Distributed Big Data Processing in SCADA Communication Networks
Engineering
Information Systems Applications (incl.Internet)
Log anomaly detection
Log template extraction
Messages
Networks
Online hierarchical clustering
Online vectorization
Signal,Image and Speech Processing
SummonAdditionalLinks – databaseName: Directory of Open Access Journals (DOAJ)
  dbid: DOA
  link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1NS8QwEA2yeNCD-InVVXLwpIRN2rRpjqu4KMjiQWVvIUkbEJZV9sPf7yRp111BvXht05LOvMy8MOkbhC7AyZaLDMArXeZFtVNiMl4Rzg2tcl0yHU75vjyI4bAcjeTjSqsvfyYsygNHw_VEXtG6NoZlRnOuC0jndW4BZ8bAjkoGakSFbDdTMQZnXnOvqWGysujNWAY4g22zJMAPKOFrWSiI9a8xzG9F0ZBrBrtopyGJuB8nt4c26sk-2l6RDjxA9_0JjioXGKIX9gpTY6CNGGLtNP6rgGNzaOzzVAVjse96HeoG4BZsxwsvkQDvOkTPg9unmzvStEUgFhbYnHCb-k93FpK_KaQuuLUGjOK0E1QXvqwiqZbaGS40cy51Ipd1VZRGOmAjLDtCncnbpD5GWFdMVsB5Ui4gVRsIwsIYkddGM2phcSaItmZSttEM960rxirsHcpCRcsqsKzyllU8QZfLR96jYMZvg6-97ZcDvdZ1uAAIUA0C1F8ISFC39ZxqFuBMAevxTIazNEFXrTe_bv84o5P_mNEp2ko91mhO0rKLOvPpoj5Dm_Zj_jqbngekfgIAi-pw
  priority: 102
  providerName: Directory of Open Access Journals
– databaseName: AAdvanced Technologies & Aerospace Database (subscription)
  dbid: P5Z
  link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1NT9wwEB3BtodygNIWsUCRDz1RRcSOE8cntCBQkRDiUBDqxbIdu0Ja7cLuwu9nJnGgVIIL19ixLL_5zDhvAH4gyF6qAoVXx4JItUXmCtlkUrq8KW3NbXvL9-pMnZ_X19f6In1wm6drlb1NbA11M_X0jXwf3Ri5JsnFwe1dRl2jqLqaWmgswwdiSaDWDRfln94SF8S8RwlXhYrEpRKpqsnran_OC5Q8TKQ1jhR5Jl_4pZa-_0XM-V-ZtPU-J2vv3fdnWE1xJxt1grIOS2HyBVb-YSP8CqejCeuIMxgaREakVWOMRBma71n3-wPr-k0zcn0NzmXUSLstRSDSzI_viXUB1_oGlyfHv49-ZanTQuZRZxeZ9MJhfho9xhOu0raS3jsdymijym1FlRqdW22jk8ryGEVUpQ5NVTsdMcDhxQYMJtNJ2ARmG64bDKMEnrcUDu26ck6VwVmee9T3IeT9ORufaMipG8bYtOlIXZkOGoPQGILGyCHsPb1y23FwvDX5kMB7mkj02e2D6eyvSdpoVNnkITjHC2eltBXGiKH0aLwcHYO2Q9jpwTRJp-fmGckh_OzF4Xn41R1tvb3YNnwSJIZ5mYl6BwaL2X34Dh_9w-JmPtttBfoR4fb52Q
  priority: 102
  providerName: ProQuest
Title An online log template extraction method based on hierarchical clustering
URI https://link.springer.com/article/10.1186/s13638-019-1430-4
https://www.proquest.com/docview/2231293412
https://doaj.org/article/75d0eebb13ba44a6929e5c578bb0279a
Volume 2019
WOSCitedRecordID wos000469495600005&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAON
  databaseName: DOAJ Directory of Open Access Journals
  customDbUrl:
  eissn: 1687-1499
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0033492
  issn: 1687-1499
  databaseCode: DOA
  dateStart: 20040101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
– providerCode: PRVAVX
  databaseName: SpringerOpen
  customDbUrl:
  eissn: 1687-1499
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0033492
  issn: 1687-1499
  databaseCode: C24
  dateStart: 20041201
  isFulltext: true
  titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22
  providerName: Springer Nature
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3PT9swFH7ayg7jwMYAUcYqHzhtshYndhwfCwINDaoIsYlxsWzHRkhVQW3h7-fZSdiYxqTtkkNsR9b7-TnP_gywh0p2XBZovCoUkVQ7p7bgDeXcZo0wFTNpl-_3EzmZVBcXqu7OcS_63e59STJF6uTWVfl5wQq0FVz6Koo5PqP8JawIVqm4j-8gHnFow28R6fa68uUfhz1JQImn_wm4_K0emtLM0Zv_muBbWOtQJRm3ZrAOL_zsHaz-wjW4AcfjGWlpMQiGOxIpqaaIMwkG53l7uIG0t0mTmNga7EviNdmp0IB6JG56FzkV8Fub8O3o8PzgC-3uUaAOPXJJucstrj6DQ7RgS2VK7pxVXgQTZGbKWIdRmVEmWC4NCyEPUijflJVVAeELK7ZgMLuZ-W0gpmGqQZCUc4m53WLUltZK4a1hmUNvHkLWC1e7jmQ83nUx1WmxUZW6lZJGKekoJc2H8PFxyG3LsPG3zvtRY48dIzl2enEzv9Kdr2kpmsx7a1lhDeemRATohcPQZKMYlBnCbq9v3XnsQiNMitCHs3wIn3r9_mx-dkY7_9T7PbzOo4FkgubVLgyW8zv_AV65--X1Yj6Clf3DSX02SgY9Sr8H8PlVUnzW4hLb6-PT-scD0lPy_A
linkProvider Springer Nature
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9QwEB6VggQcyquIpQV8gAsoavxIHB8qVB5VV7usOBTUm7EdGyGtdsvuFsSf4jd2Jo-WItFbD1wTx0rsb-abySTfADzHTQ5KSwSvSZJEtUXmpaozpXxeF67irvnK9_NYTybV0ZH5uAa_-39h6LPK3ic2jrqeB3pHvoM0RtSkuHh9_D2jrlFUXe1baLSwGMVfPzFlW-4O3-H-vhBi__3h24Os6yqQBcTnKlNBeMzFUkDu9KVxpQrBm1gkl3TuSqpKmNwZl7zSjqckki5MrMvKm4RkziXOew2uK1lpsquRznrPL0npjxK8Eg2XKy26Kiqvyp0ll4h0TNwNnpF5pi7wYNMu4EKM-1dZtmG7_Tv_2zrdhY0urmZ7rSHcg7U4uw-3_1BbfADDvRlrhUEYOnxGolxTjLQZ0tOi_b2Dtf20GVF7jWMZNQpvSi2IZBamJ6QqgXNtwqcreZaHsD6bz-IjYK7mpsYwUeD-KuGRt7T3uoje8TygPxtA3u-rDZ3MOnX7mNom3apK20LBIhQsQcGqAbw8u-S41Ri5bPAbAsvZQJIHbw7MF19t522sLuo8Ru-59E4pV2IMHIuAztnTMhg3gO0ePLbzWUt7jpwBvOrhd376n3f0-PLJnsHNg8MPYzseTkZbcEuQCeRFJqptWF8tTuITuBF-rL4tF08bY2Lw5apReQpXflfA
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Nb9QwEB2VFiF6oAWKWGipD3ABRRs7ThwfECqUFatWqz0AqrgY27GrSqvdsrst4q_x65jJR0uR2lsPXBPHiuPneTMZ-w3AS5xkL1WG4NUxI1FtkbhMVomULq1yW3Jb7_L9eqhGo_LoSI9X4Hd3Foa2VXY2sTbU1czTP_I-0hhRk-SiH9ttEeP9wbvTHwlVkKJMa1dOo4HIQfj1E8O3xdvhPs71KyEGHz9_-JS0FQYSj1hdJtILh3FZ9MijrtC2kN47HfJoo0ptQRkKnVpto5PK8hhFVLkOVVE6HZHYeYb93oE1hTEmbScc5986FshI9Y-CvQIXMZdKtBlVXhb9Bc8Q9RjEa7yTpYm8wol16YAr_u4_Kdqa-QYb__M324QHrb_N9poF8hBWwvQRrP-lwvgYhntT1giGMCQCRmJdE_TAGY5j3hz7YE2dbUaUX2FbRgXE6xQMIpz5yRmpTWBfW_DlVsbyBFans2l4CsxWXFfoPgqcaykc8plyTuXBWZ56tHM9SLs5Nr6VX6cqIBNTh2FlYRpYGISFIVgY2YPXF4-cNtojNzV-T8C5aEiy4fWF2fzYtFbIqLxKQ3COZ85KaQv0jUPu0Wg7-gza9mC7A5JpbdnCXKKoB286KF7evvaNnt3c2S7cQzCaw-Ho4DncF7Qa0jwR5TasLudnYQfu-vPlyWL-ol5XDL7fNij_APedYOQ
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=An+online+log+template+extraction+method+based+on+hierarchical+clustering&rft.jtitle=EURASIP+journal+on+wireless+communications+and+networking&rft.au=Yang%2C+Ruipeng&rft.au=Qu%2C+Dan&rft.au=Qian%2C+Yekui&rft.au=Dai%2C+Yusheng&rft.date=2019-05-28&rft.issn=1687-1499&rft.eissn=1687-1499&rft.volume=2019&rft.issue=1&rft_id=info:doi/10.1186%2Fs13638-019-1430-4&rft.externalDBID=n%2Fa&rft.externalDocID=10_1186_s13638_019_1430_4
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1687-1499&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1687-1499&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1687-1499&client=summon