Experience Report: System Log Analysis for Anomaly Detection

Anomaly detection plays an important role in management of modern large-scale distributed systems. Logs, which record system runtime information, are widely used for anomaly detection. Traditionally, developers (or operators) often inspect the logs manually with keyword search and rule matching. The...

Celý popis

Uložené v:
Podrobná bibliografia
Vydané v:Proceedings - International Symposium on Software Reliability Engineering s. 207 - 218
Hlavní autori: Shilin He, Jieming Zhu, Pinjia He, Lyu, Michael R.
Médium: Konferenčný príspevok..
Jazyk:English
Vydavateľské údaje: IEEE 01.10.2016
Predmet:
ISSN:2332-6549
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Abstract Anomaly detection plays an important role in management of modern large-scale distributed systems. Logs, which record system runtime information, are widely used for anomaly detection. Traditionally, developers (or operators) often inspect the logs manually with keyword search and rule matching. The increasing scale and complexity of modern systems, however, make the volume of logs explode, which renders the infeasibility of manual inspection. To reduce manual effort, many anomaly detection methods based on automated log analysis are proposed. However, developers may still have no idea which anomaly detection methods they should adopt, because there is a lack of a review and comparison among these anomaly detection methods. Moreover, even if developers decide to employ an anomaly detection method, re-implementation requires a nontrivial effort. To address these problems, we provide a detailed review and evaluation of six state-of-the-art log-based anomaly detection methods, including three supervised methods and three unsupervised methods, and also release an open-source toolkit allowing ease of reuse. These methods have been evaluated on two publicly-available production log datasets, with a total of 15,923,592 log messages and 365,298 anomaly instances. We believe that our work, with the evaluation results as well as the corresponding findings, can provide guidelines for adoption of these methods and provide references for future development.
AbstractList Anomaly detection plays an important role in management of modern large-scale distributed systems. Logs, which record system runtime information, are widely used for anomaly detection. Traditionally, developers (or operators) often inspect the logs manually with keyword search and rule matching. The increasing scale and complexity of modern systems, however, make the volume of logs explode, which renders the infeasibility of manual inspection. To reduce manual effort, many anomaly detection methods based on automated log analysis are proposed. However, developers may still have no idea which anomaly detection methods they should adopt, because there is a lack of a review and comparison among these anomaly detection methods. Moreover, even if developers decide to employ an anomaly detection method, re-implementation requires a nontrivial effort. To address these problems, we provide a detailed review and evaluation of six state-of-the-art log-based anomaly detection methods, including three supervised methods and three unsupervised methods, and also release an open-source toolkit allowing ease of reuse. These methods have been evaluated on two publicly-available production log datasets, with a total of 15,923,592 log messages and 365,298 anomaly instances. We believe that our work, with the evaluation results as well as the corresponding findings, can provide guidelines for adoption of these methods and provide references for future development.
Author Pinjia He
Jieming Zhu
Lyu, Michael R.
Shilin He
Author_xml – sequence: 1
  surname: Shilin He
  fullname: Shilin He
  email: slhe@cse.cuhk.edu.hk
  organization: Dept. of Comput. Sci. & Eng., Chinese Univ. of Hong Kong, Hong Kong, China
– sequence: 2
  surname: Jieming Zhu
  fullname: Jieming Zhu
  email: jmzhu@cse.cuhk.edu.hk
  organization: Dept. of Comput. Sci. & Eng., Chinese Univ. of Hong Kong, Hong Kong, China
– sequence: 3
  surname: Pinjia He
  fullname: Pinjia He
  email: pjhe@cse.cuhk.edu.hk
  organization: Dept. of Comput. Sci. & Eng., Chinese Univ. of Hong Kong, Hong Kong, China
– sequence: 4
  givenname: Michael R.
  surname: Lyu
  fullname: Lyu, Michael R.
  email: lyu@cse.cuhk.edu.hk
  organization: Dept. of Comput. Sci. & Eng., Chinese Univ. of Hong Kong, Hong Kong, China
BookMark eNotjE9LwzAcQKMouE6PnrzkC7Tml7-NeBlz6qAgrAreRpb9KpG1KU0P9ttb0NPjvcPLyEUXOyTkFlgBwOz9tq53m4Iz0AWHM5KB1EZYxvjnOVlwIXiulbRXJEvpe65MAl-Qx81Pj0PAziPdYR-H8YHWUxqxpVX8oqvOnaYUEm3iMEtsZ6VPOKIfQ-yuyWXjTglv_rkkH8-b9_VrXr29bNerKg9g1Jh7qRVyaVEbr43TvkSmvS5LeywPByeNPXpjHHfABTO2VIo3UkuN3jNnLYglufv7BkTc90No3TDtjTFScRC_uCJHvQ
CODEN IEEPAD
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ISSRE.2016.21
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISBN 146739002X
9781467390026
EISSN 2332-6549
EndPage 218
ExternalDocumentID 7774521
Genre orig-research
GroupedDBID 23M
29G
29N
29O
6IE
6IF
6IH
6IK
6IL
6IN
AAJGR
AAWTH
ABLEC
ACGFS
ADZIZ
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
IEGSK
IPLJI
M43
OCL
RIE
RIL
RNS
ID FETCH-LOGICAL-i175t-c465e249e67c67a6c8e06c6889d8bba479dc77a2a1230798552f4646ecc0a9913
IEDL.DBID RIE
ISICitedReferencesCount 367
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000391437700020&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
IngestDate Wed Aug 27 01:53:14 EDT 2025
IsPeerReviewed false
IsScholarly true
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i175t-c465e249e67c67a6c8e06c6889d8bba479dc77a2a1230798552f4646ecc0a9913
PageCount 12
ParticipantIDs ieee_primary_7774521
PublicationCentury 2000
PublicationDate 2016-Oct.
PublicationDateYYYYMMDD 2016-10-01
PublicationDate_xml – month: 10
  year: 2016
  text: 2016-Oct.
PublicationDecade 2010
PublicationTitle Proceedings - International Symposium on Software Reliability Engineering
PublicationTitleAbbrev ISSRE
PublicationYear 2016
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0020412
Score 2.5158243
Snippet Anomaly detection plays an important role in management of modern large-scale distributed systems. Logs, which record system runtime information, are widely...
SourceID ieee
SourceType Publisher
StartPage 207
SubjectTerms Feature extraction
Industries
Inspection
Large-scale systems
Manuals
Open source software
Runtime
Title Experience Report: System Log Analysis for Anomaly Detection
URI https://ieeexplore.ieee.org/document/7774521
WOSCitedRecordID wos000391437700020&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1NT8MwDLXGxIHTgA3xrRw40m1tUydB3GATSGiaGEi7TUnqoR1op9Hx-0nabuPAhZudSyRbke34-RngJjJKq8hVqhSiDDhpERhtMQjTWOIcY8Pnplw2IUYjOZ2qcQNut7MwRFSCz6jrxbKXn-Z27b_KesLlKomfGt9zUjWrtS2uPG_UjkOz9zyZvA48cgu7ngb01-aUMnAMW_-78hA6uwk8Nt7GliNoUHYMrc0KBla_yDbc76iKWZVL37GKhJy95B9sQznCXGrqlPzTqeyRihJ_lXXgfTh4e3gK6oUIwcJF-SKwHBNy9RKhsCg0Wkl9tCilSqUxmguVWiF0pEMP71YySaI5R47OTX3tEsH4BJpZntEpMGVkGGphVCIVlyRN6uI-2ti3SUWSxmfQ9saYLSvOi1lth_O_jy_gwJu6ArldQrNYrekK9u13sfhaXZeO-gG8PJQ-
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1NTwIxEJ0QNNETKhi_7cGjC-xuO22NN5VAREIEE26k7RbDwV2Di7_fdpcPD168dXppMk3zZjpv3gDcRFoqGblM1YYoAmoVD7QyGIRJLHCGsaYzXQyb4IOBmEzksAK3m14Ya21BPrNNvyxq-Ulmlv6rrMVdrMJ81_gOozQKy26tTXrllaO2Kpqt3mj0-uS5W9j0QqC_ZqcU0NGp_e_QA2hse_DIcIMuh1Cx6RHU1kMYyOpN1uF-K1ZMymj6jpQy5KSfvZO16Ahxwakzsg9nkkebFwystAFvnafxQzdYjUQI5g7n88BQZNZlTBa5Qa7QCNtGg0LIRGitKJeJ4VxFKvQEbykYi2YUKbqLaisXCsbHUE2z1J4AkVqEoeJaMiGpsEInDvnRxL5QylkSn0LdO2P6WapeTFd-OPt7-xr2uuOX_rTfGzyfw753e0l5u4BqvljaS9g13_n8a3FVXNoPpL-XhQ
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=proceeding&rft.title=Proceedings+-+International+Symposium+on+Software+Reliability+Engineering&rft.atitle=Experience+Report%3A+System+Log+Analysis+for+Anomaly+Detection&rft.au=Shilin+He&rft.au=Jieming+Zhu&rft.au=Pinjia+He&rft.au=Lyu%2C+Michael+R.&rft.date=2016-10-01&rft.pub=IEEE&rft.eissn=2332-6549&rft.spage=207&rft.epage=218&rft_id=info:doi/10.1109%2FISSRE.2016.21&rft.externalDocID=7774521