Execution Anomaly Detection in Distributed Systems through Unstructured Log Analysis

作者: Qiang Fu , Jian-Guang Lou , Yi Wang , Jiang Li

DOI: 10.1109/ICDM.2009.60

关键词: TroubleshootingData miningAnomaly detectionDistributed computingSource codeEntropy (information theory)Computer science

摘要: … detection techniques based on log analysis. In this paper, we propose an unstructured log analysis technique for anomaly detection… text messages in log files to log keys without heavily …

参考文章(17)
Wei Xu, Ling Huang, Armando Fox, David A Patterson, Michael I Jordan, None, Mining console logs for large-scale system problem detection usenix workshop on tackling computer systems problems with machine learning techniques. pp. 4- 4 ,(2008)
Soila Kavulya, Jiaqi Tan, Rajeev Gandhi, Xinghao Pan, Priya Narasimhan, SALSA: analyzing logs as state machines WASL'08 Proceedings of the First USENIX conference on Analysis of system logs. pp. 6- 6 ,(2008)
Michael Isard, Mihai Budiu, Yuan Yu, Andrew Birrell, Dennis Fetterly, Dryad: distributed data-parallel programs from sequential building blocks european conference on computer systems. ,vol. 41, pp. 59- 72 ,(2007) , 10.1145/1272996.1273005
S. Orlando, S. Russo, Java Virtual Machine monitoring for dependability benchmarking international symposium on object/component/service-oriented real-time distributed computing. pp. 433- 440 ,(2006) , 10.1109/ISORC.2006.45
Mike Chen, Alice X Zheng, Jim Lloyd, Michael I Jordan, Eric Brewer, None, Failure diagnosis using decision trees international conference on autonomic computing. pp. 36- 43 ,(2004) , 10.1109/ICAC.2004.1301345
Sanjay Ghemawat, Howard Gobioff, Shun-Tak Leung, The Google file system symposium on operating systems principles. ,vol. 37, pp. 29- 43 ,(2003) , 10.1145/1165389.945450
Noam Palatin, Arie Leizarowitz, Assaf Schuster, Ran Wolff, Mining for misconfigured machines in grid systems knowledge discovery and data mining. pp. 687- 692 ,(2006) , 10.1145/1150402.1150488
Muthu Dayalan, , MapReduce: simplified data processing on large clusters operating systems design and implementation. ,vol. 5, pp. 10- 10 ,(2004) , 10.21276/IJRE.2018.5.5.4
David Lo, Siau-cheng Khoo, QUARK: Empirical Assessment of Automaton-based Specification Miners working conference on reverse engineering. pp. 51- 60 ,(2006) , 10.1109/WCRE.2006.47
Chun Yuan, Ni Lao, Ji-Rong Wen, Jiwei Li, Zheng Zhang, Yi-Min Wang, Wei-Ying Ma, Automated known problem diagnosis with event traces Proceedings of the 2006 EuroSys conference on - EuroSys '06. ,vol. 40, pp. 375- 388 ,(2006) , 10.1145/1217935.1217972