Skip to main content
Erschienen in: The Journal of Supercomputing 2/2018

23.10.2017

Dlog: diagnosing router events with syslogs for anomaly detection

verfasst von: Teng Li, JianFeng Ma, Cong Sun

Erschienen in: The Journal of Supercomputing | Ausgabe 2/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Router systems are notoriously difficult to understand or diagnose for their closure and heterogeneity. A common way of gaining insight into the router system and detecting the anomaly behaviors is to inspect the router syslogs. Unfortunately, syslogs are difficult to inspect because they are large-scale, unstructured and various in different vendors and services. Besides, they are too low-level to be directly used in anomaly detection. Prevalent approaches to understanding syslogs focus on simple keyword search (such as error and exception) of logs that may be associated with the failures. Such an approach is time consuming and error prone. In this paper, we present Dlog which can automatically transform and compress such low-level and minimally structured syslog messages into meaningful and prioritized high-level network events that can be used in anomaly detection. Dlog has two main steps: the first is the training process that learns the features of the normal and abnormal events; the second is anomaly detection and classification which can detect the anomalous events and provide the network operators with specific attack modes. We have applied our approach in a university network which contains Cisco, Huawei and Dlink routers for 5 months. We aligned our experiment with a former work as a baseline for comparison. Dlog is 23% faster in log template extraction and has improved the accuracy rate in template extraction 2 times higher than the former work. Besides, we can achieve 96% precision rate in anomaly detection and provide users with the attack modes in seven clusters.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Sipos R, Fradkin D, Moerchen F, Wang Z (2014) Log-based predictive maintenance. In: Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, pp 1867–1876 Sipos R, Fradkin D, Moerchen F, Wang Z (2014) Log-based predictive maintenance. In: Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, pp 1867–1876
2.
Zurück zum Zitat Qiu T, Ge Z, Pei D, Wang J, Xu J (2010) What happened in my network: mining network events from router syslogs. In: Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement. ACM, pp 472–484 Qiu T, Ge Z, Pei D, Wang J, Xu J (2010) What happened in my network: mining network events from router syslogs. In: Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement. ACM, pp 472–484
3.
Zurück zum Zitat Lin Q, Zhang H, Lou JG, Zhang Y, Chen X (2016) Log clustering based problem identification for online service systems. In: Proceedings of the 38th International Conference on Software Engineering Companion. ACM, pp 102–111 Lin Q, Zhang H, Lou JG, Zhang Y, Chen X (2016) Log clustering based problem identification for online service systems. In: Proceedings of the 38th International Conference on Software Engineering Companion. ACM, pp 102–111
4.
Zurück zum Zitat Lou JG, Fu Q, Yang S, Xu Y, Li J (2010) Mining invariants from console logs for system problem detection. In: USENIX Annual Technical Conference Lou JG, Fu Q, Yang S, Xu Y, Li J (2010) Mining invariants from console logs for system problem detection. In: USENIX Annual Technical Conference
5.
Zurück zum Zitat Turner D, Levchenko K, Snoeren AC, Savage S (2010) California fault lines: understanding the causes and impact of network failures. In: ACM SIGCOMM Computer Communication Review, vol 40, no 4. ACM, pp 315–326 Turner D, Levchenko K, Snoeren AC, Savage S (2010) California fault lines: understanding the causes and impact of network failures. In: ACM SIGCOMM Computer Communication Review, vol 40, no 4. ACM, pp 315–326
6.
Zurück zum Zitat Jiang W, Hu C, Pasupathy S, Kanevsky A, Li Z, Zhou Y (2009) Understanding customer problem troubleshooting from storage system logs. In: FAST, vol 9, pp 43–56 Jiang W, Hu C, Pasupathy S, Kanevsky A, Li Z, Zhou Y (2009) Understanding customer problem troubleshooting from storage system logs. In: FAST, vol 9, pp 43–56
7.
Zurück zum Zitat Shang W, Jiang ZM, Hemmati H, Adams B, Hassan AE, Martin P (2013) Assisting developers of big data analytics applications when deploying on hadoop clouds. In: Proceedings of the 2013 International Conference on Software Engineering. IEEE Press, pp 402–411 Shang W, Jiang ZM, Hemmati H, Adams B, Hassan AE, Martin P (2013) Assisting developers of big data analytics applications when deploying on hadoop clouds. In: Proceedings of the 2013 International Conference on Software Engineering. IEEE Press, pp 402–411
8.
Zurück zum Zitat Wu Y, Zhao M, Haeberlen A, Zhou W, Loo BT (2014) Diagnosing missing events in distributed systems with negative provenance. In: ACM SIGCOMM Computer Communication Review, vol 44, no 4. ACM, pp 383–394 Wu Y, Zhao M, Haeberlen A, Zhou W, Loo BT (2014) Diagnosing missing events in distributed systems with negative provenance. In: ACM SIGCOMM Computer Communication Review, vol 44, no 4. ACM, pp 383–394
9.
Zurück zum Zitat Xu W, Huang L, Fox A, Patterson D, Jordan MI (2009) Detecting large-scale system problems by mining console logs. In: Proceedings of the 22nd ACM SIGOPS. ACM, pp 117–132 Xu W, Huang L, Fox A, Patterson D, Jordan MI (2009) Detecting large-scale system problems by mining console logs. In: Proceedings of the 22nd ACM SIGOPS. ACM, pp 117–132
10.
Zurück zum Zitat Zhao X, Zhang Y, Lion D, Ullah MF, Luo Y, Yuan D, Stumm M (2014) lprof: a non-intrusive request flow profiler for distributed systems. In: OSDI, vol 14, pp 629–644 Zhao X, Zhang Y, Lion D, Ullah MF, Luo Y, Yuan D, Stumm M (2014) lprof: a non-intrusive request flow profiler for distributed systems. In: OSDI, vol 14, pp 629–644
11.
Zurück zum Zitat Lin Z, Jiang X, Xu D, Zhang X (2008) Automatic protocol format reverse engineering through context-aware monitored execution. In: NDSS, vol 8, pp 1–15 Lin Z, Jiang X, Xu D, Zhang X (2008) Automatic protocol format reverse engineering through context-aware monitored execution. In: NDSS, vol 8, pp 1–15
12.
Zurück zum Zitat Wondracek G, Comparetti PM, Kruegel C, Kirda E, Anna SSS (2008) Automatic network protocol analysis. In: NDSS, vol 8, pp 1–14 Wondracek G, Comparetti PM, Kruegel C, Kirda E, Anna SSS (2008) Automatic network protocol analysis. In: NDSS, vol 8, pp 1–14
13.
Zurück zum Zitat Potharaju R, Jain N, Nita-Rotaru C (2013) Juggling the jigsaw: towards automated problem inference from network trouble tickets. In: NSDI, pp 127–141 Potharaju R, Jain N, Nita-Rotaru C (2013) Juggling the jigsaw: towards automated problem inference from network trouble tickets. In: NSDI, pp 127–141
14.
Zurück zum Zitat Fu Q, Lou JG, Wang Y, Li J (2009) Execution anomaly detection in distributed systems through unstructured log analysis. In: Ninth IEEE International Conference on ICDM’09. IEEE, pp 149–158 Fu Q, Lou JG, Wang Y, Li J (2009) Execution anomaly detection in distributed systems through unstructured log analysis. In: Ninth IEEE International Conference on ICDM’09. IEEE, pp 149–158
15.
Zurück zum Zitat Beschastnikh I, Brun Y, Ernst MD, Krishnamurthy A (2014) Inferring models of concurrent systems from logs of their behavior with csight. In: Proceedings of the 36th International Conference on Software Engineering. ACM, pp 468–479 Beschastnikh I, Brun Y, Ernst MD, Krishnamurthy A (2014) Inferring models of concurrent systems from logs of their behavior with csight. In: Proceedings of the 36th International Conference on Software Engineering. ACM, pp 468–479
16.
Zurück zum Zitat Ya J, Liu T, Zhang H, Shi J, Guo L (2015) An automatic approach to extract the formats of network and security log messages. In: Military Communications Conference, MILCOM’15. IEEE, pp 1542–1547 Ya J, Liu T, Zhang H, Shi J, Guo L (2015) An automatic approach to extract the formats of network and security log messages. In: Military Communications Conference, MILCOM’15. IEEE, pp 1542–1547
17.
Zurück zum Zitat Liang C, Benson T, Kanuparthy P, He Y (2016) Finding needles in the haystack: harnessing syslogs for data center management. arXiv preprint arXiv:1605.06150 Liang C, Benson T, Kanuparthy P, He Y (2016) Finding needles in the haystack: harnessing syslogs for data center management. arXiv preprint arXiv:​1605.​06150
18.
Zurück zum Zitat Medem A, Akodjenou MI, Teixeira R (2009) Troubleminer: mining network trouble tickets. In: IFIP/IEEE International Symposium on Integrated Network Management-Workshops, IM’09. IEEE, pp. 113–119 Medem A, Akodjenou MI, Teixeira R (2009) Troubleminer: mining network trouble tickets. In: IFIP/IEEE International Symposium on Integrated Network Management-Workshops, IM’09. IEEE, pp. 113–119
19.
Zurück zum Zitat Wold S, Esbensen K, Geladi P (1987) Principal component analysis. Chemom Intell Lab Syst 2(1–3):37–52CrossRef Wold S, Esbensen K, Geladi P (1987) Principal component analysis. Chemom Intell Lab Syst 2(1–3):37–52CrossRef
20.
Zurück zum Zitat Xu W, Huang L, Fox A, Patterson D, Jordan M (2009) Online system problem detection by mining patterns of console logs. In: Ninth IEEE International Conference on ICDM’09. IEEE, pp 588–597 Xu W, Huang L, Fox A, Patterson D, Jordan M (2009) Online system problem detection by mining patterns of console logs. In: Ninth IEEE International Conference on ICDM’09. IEEE, pp 588–597
21.
Zurück zum Zitat Kimura T, Watanabe A, Toyono T, Ishibashi K (2015) Proactive failure detection learning generation patterns of large-scale network logs. In: Network and Service Management (CNSM’15). IEEE, pp 8–14 Kimura T, Watanabe A, Toyono T, Ishibashi K (2015) Proactive failure detection learning generation patterns of large-scale network logs. In: Network and Service Management (CNSM’15). IEEE, pp 8–14
23.
Zurück zum Zitat Velmurugan T, Santhanam T (2010) Computational complexity between k-means and k-medoids clustering algorithms for normal and uniform distributions of data points. J Comput Sci 6(3):363CrossRef Velmurugan T, Santhanam T (2010) Computational complexity between k-means and k-medoids clustering algorithms for normal and uniform distributions of data points. J Comput Sci 6(3):363CrossRef
26.
Zurück zum Zitat Yamanishi K, Maruyama Y (2005) Dynamic syslog mining for network failure monitoring. In: Proceedings of the Eleventh ACM SIGKDD. ACM, pp 499–508 Yamanishi K, Maruyama Y (2005) Dynamic syslog mining for network failure monitoring. In: Proceedings of the Eleventh ACM SIGKDD. ACM, pp 499–508
27.
Zurück zum Zitat Kimura T, Ishibashi K, Mori T, Sawada H, Toyono T, Nishimatsu K, Watanabe A, Shimoda A, Shiomoto K (2014) Spatio-temporal factorization of log data for understanding network events. In: INFOCOM, 2014 Proceedings IEEE. IEEE, pp 610–618 Kimura T, Ishibashi K, Mori T, Sawada H, Toyono T, Nishimatsu K, Watanabe A, Shimoda A, Shiomoto K (2014) Spatio-temporal factorization of log data for understanding network events. In: INFOCOM, 2014 Proceedings IEEE. IEEE, pp 610–618
32.
Zurück zum Zitat Haeberlen A, Kouznetsov P, Druschel P (2007) Peerreview: practical accountability for distributed systems. In: ACM SIGOPS, vol 41, no 6. ACM, pp 175–188 Haeberlen A, Kouznetsov P, Druschel P (2007) Peerreview: practical accountability for distributed systems. In: ACM SIGOPS, vol 41, no 6. ACM, pp 175–188
33.
Zurück zum Zitat Haeberlen A, Avramopoulos IC, Rexford J, Druschel P (2009) Netreview: detecting when interdomain routing goes wrong. In: NSDI, pp 437–452 Haeberlen A, Avramopoulos IC, Rexford J, Druschel P (2009) Netreview: detecting when interdomain routing goes wrong. In: NSDI, pp 437–452
34.
Zurück zum Zitat Wu Y, Haeberlen A, Zhou W, Loo BT (2013) Answering why-not queries in software-defined networks with negative provenance. In: Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks. ACM, p 3 Wu Y, Haeberlen A, Zhou W, Loo BT (2013) Answering why-not queries in software-defined networks with negative provenance. In: Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks. ACM, p 3
35.
Zurück zum Zitat Fukuda K (2011) On the use of weighted syslog time series for anomaly detection. In: 2011 IFIP/IEEE International Symposium on Integrated Network Management (IM). IEEE, pp 393–398 Fukuda K (2011) On the use of weighted syslog time series for anomaly detection. In: 2011 IFIP/IEEE International Symposium on Integrated Network Management (IM). IEEE, pp 393–398
36.
Zurück zum Zitat Tan T, Gao S, Yang W, Song Y, Lin C (2016) Two new term weighting methods for router syslogs anomaly detection. In: HPCC’16/SmartCity’16/DSS’16. IEEE, pp 1454–1460 Tan T, Gao S, Yang W, Song Y, Lin C (2016) Two new term weighting methods for router syslogs anomaly detection. In: HPCC’16/SmartCity’16/DSS’16. IEEE, pp 1454–1460
37.
Zurück zum Zitat Chuah E, Kuo SH, Hiew P, Tjhi WC, Lee G, Hammond J, Michalewicz MT, Hung T, Browne JC (2010) Diagnosing the root-causes of failures from cluster log files. In: High Performance Computing (HiPC). IEEE, pp 1–10 Chuah E, Kuo SH, Hiew P, Tjhi WC, Lee G, Hammond J, Michalewicz MT, Hung T, Browne JC (2010) Diagnosing the root-causes of failures from cluster log files. In: High Performance Computing (HiPC). IEEE, pp 1–10
Metadaten
Titel
Dlog: diagnosing router events with syslogs for anomaly detection
verfasst von
Teng Li
JianFeng Ma
Cong Sun
Publikationsdatum
23.10.2017
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 2/2018
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-017-2165-9

Weitere Artikel der Ausgabe 2/2018

The Journal of Supercomputing 2/2018 Zur Ausgabe