skip to main content
10.1145/3229607.3229608acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
research-article
Free Access

Finding Anomalies in Network System Logs with Latent Variables

Published:07 August 2018Publication History

ABSTRACT

System logs are useful to understand the status of and detect faults in large scale networks. However, due to their diversity and volume of these logs, log analysis requires much time and effort. In this paper, we propose a log event anomaly detection method for large-scale networks without pre-processing and feature extraction. The key idea is to embed a large amount of diverse data into hidden states by using latent variables. We evaluate our method with 15 months of system logs obtained from a nation-wide academic network in Japan. Through comparisons with Kleinberg's univariate burst detection and a traditional multivariate analysis (i.e., PCA), we demonstrate that our proposed method detects anomalies and ease troubleshooting of network system faults.

References

  1. E. Baseman, S. Blanchard, and E. Zongzelimyuntedu. Relational Synthesis of Text and Numeric Data for Anomaly Detection on Computing System Logs. In Proc. IEEE ICMLA'16, pages 2--5, 2016.Google ScholarGoogle ScholarCross RefCross Ref
  2. M. Ester, H.-P. Kriegel, J. Sander, and X. Xu. A Density-based Algorithm for Discovering Clusters a Density-based Algorithm for Discovering Clusters in Large Spatial Databases with Noise. In Proc. ACM KDD'96, pages 226--231, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. T. Hacker, R. Pais, and C. Rong. A markov random field based approach for analyzing supercomputer system logs. IEEE Transactions on Cloud Computing, pages 1--1, 2017.Google ScholarGoogle ScholarCross RefCross Ref
  4. T. Kimura, K. Ishibashi, T. Mori, H. Sawada, T. Toyono, K. Nishimatsu, A. Watanabe, A. Shimoda, and K. Shiomoto. Spatio-temporal factorization of log data for understanding network events. In Proc IEEE INFOCOM'14, pages 610--618, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  5. T. Kimura, A. Watanabe, T. Toyono, and K. Ishibashi. Proactive failure detection learning generation patterns of large-scale network logs. In Proc CNSM'15, pages 8--14, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. D. P. Kingma, D. J. Rezende, S. Mohamed, and M. Welling. Semi-Supervised Learning with Deep Generative Models. pages 1--9, 2014.Google ScholarGoogle Scholar
  7. D. P. Kingma and M. Welling. Auto-Encoding Variational Bayes. (Ml):1--14, 2013.Google ScholarGoogle Scholar
  8. J. Kleinberg. Bursty and Hierarchical Structure in Streams. In Proc. ACM KDD'02, pages 91--101, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. S. Kobayashi, K. Otomo, K. Fukuda, and H. Esaki. Mining causality of network events in log data. IEEE TNSM, 15(1):53--67, 2018.Google ScholarGoogle Scholar
  10. A. Lakhina, M. Crovella, and C. Diot. Diagnosing network-wide traffic anomalies. In Proc. ACM SIGCOMM'04, 34(4):219, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. S. Lu, B. Rao, X. Wei, B. Tak, L. Wang, and L. Wang. Log-based Abnormal Task Detection and Root Cause Analysis for Spark. In Proc. IEEE ICWS'17, 2017.Google ScholarGoogle ScholarCross RefCross Ref
  12. M. Moh, S. Pininti, S. Doddapaneni, and T.-S. Moh. Detecting Web Attacks Using Multi-stage Log Analysis. In Proc. IEEE IACC'16, pages 733--738, 2016.Google ScholarGoogle Scholar
  13. K. Otomo, S. Kobayashi, K. Fukuda, and H. Esaki. An Analysis of Burstiness and Causality of System Logs. In Proc. AINTEC'17, pages 16--23, 2017. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. M. Shatnawi and M. Hefeeda. Real-time failure prediction in online services. In Proc. IEEE INFOCOM'15, pages 1391--1399, 2015.Google ScholarGoogle ScholarCross RefCross Ref
  15. S. Urushidani, M. Aoki, K. Fukuda, S. Abe, M. Nakamura, M. Koibuchi, Y. Ji, and S. Yamada. Highly available network design and resource management of SINET4. Telecommunication Systems, 56(1):33--47, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. W. Xu, L. Huang, A. Fox, D. Patterson, M. I. Jordan, L. Huang, A. Fox, D. Patterson, and M. I. Jordan. Detecting Large-Scale System Problems by Mining Console Logs. In Proc. ACM SOSP'09, pages 117--131, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Z. Zheng, Z. Lan, B. H. Park, and A. Geist. System log pre-processing to improve failure prediction. In Prco IEEE DSN'09, pages 572--577, 2009.Google ScholarGoogle ScholarCross RefCross Ref
  18. J. Zhong, W. Guo, and Z. Wang. Study on network failure prediction based on alarm logs. In Proc. ICBDSC'16, pages 23--29, 2016.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Finding Anomalies in Network System Logs with Latent Variables

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      Big-DAMA '18: Proceedings of the 2018 Workshop on Big Data Analytics and Machine Learning for Data Communication Networks
      August 2018
      58 pages
      ISBN:9781450359047
      DOI:10.1145/3229607

      Copyright © 2018 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 7 August 2018

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

      Acceptance Rates

      Overall Acceptance Rate7of11submissions,64%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader