作者: Qiang Fu , Jian-Guang Lou , Yi Wang , Jiang Li
DOI: 10.1109/ICDM.2009.60
关键词: Troubleshooting 、 Data mining 、 Anomaly detection 、 Distributed computing 、 Source code 、 Entropy (information theory) 、 Computer science
摘要: … detection techniques based on log analysis. In this paper, we propose an unstructured log analysis technique for anomaly detection… text messages in log files to log keys without heavily …