Skip to main content
Top
Published in: Optical and Quantum Electronics 1/2024

01-01-2024

Flow monitoring system and abnormal log traffic mode detection based on artificial intelligence

Authors: Jinghua Cao, Bo Pan, Xiang Zou

Published in: Optical and Quantum Electronics | Issue 1/2024

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

As the number of logs generated by each node in the national high-performance computing environment continues to increase, manual analysis of abnormal logs has become slow and inaccurate. This makes it difficult to meet the requirements of daily system analysis. In response to this problem, this paper proposes a method for defining an abnormal log business model. Through the analysis of the exception logs of the multi-node system, this paper finds that the exception logs have a certain regularity and repeatability. Therefore, the abnormal logs can be detected by analyzing the log traffic pattern. This method uses machine learning algorithm to analyze log data in multi-node system, extract normal log traffic patterns, and use these patterns to detect abnormal behavior. Experimental results show that the proposed method can effectively detect abnormal log traffic patterns in multi-node systems, with high accuracy and robustness, and can detect and locate system faults in time, improving the reliability and stability of the system. This paper provides a new solution for log traffic pattern detection of multi-node system, which has a certain application prospect in the field of computer system monitoring, and can provide a certain reference for computer system monitoring and maintenance.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
go back to reference Augusto, A., Conforti, R., Dumas, M., et al.: Automated discovery of process models from event logs: review and benchmark. IEEE Trans. Knowl. Data Eng. 31(4), 686–705 (2018)CrossRef Augusto, A., Conforti, R., Dumas, M., et al.: Automated discovery of process models from event logs: review and benchmark. IEEE Trans. Knowl. Data Eng. 31(4), 686–705 (2018)CrossRef
go back to reference Bao, W., Lianju, N., Yue, K.: Integration of unsupervised and supervised machine learning algorithms for credit risk assessment. Expert Syst. Appl. 128, 301–315 (2019)CrossRef Bao, W., Lianju, N., Yue, K.: Integration of unsupervised and supervised machine learning algorithms for credit risk assessment. Expert Syst. Appl. 128, 301–315 (2019)CrossRef
go back to reference Bhanage, D.A., Pawar, A.V., Kotecha, K.: It infrastructure anomaly detection and failure handling: a systematic literature review focusing on datasets, log preprocessing, machine & deep learning approaches and automated tool. IEEE Access 9, 156392–156421 (2021)CrossRef Bhanage, D.A., Pawar, A.V., Kotecha, K.: It infrastructure anomaly detection and failure handling: a systematic literature review focusing on datasets, log preprocessing, machine & deep learning approaches and automated tool. IEEE Access 9, 156392–156421 (2021)CrossRef
go back to reference Deokar, A.V., Tao, J.: Semantics-based event log aggregation for process mining and analytics. Inf. Syst. Front. 17, 1209–1226 (2015)CrossRef Deokar, A.V., Tao, J.: Semantics-based event log aggregation for process mining and analytics. Inf. Syst. Front. 17, 1209–1226 (2015)CrossRef
go back to reference Homayoun, S., Dehghantanha, A., Ahmadzadeh, M., Hashemi, S., Khayami, R.: Know abnormal, find evil: frequent pattern mining for ransomware threat hunting and intelligence. IEEE Trans. Emerg. Top. Comput. 8(2), 341–351 (2017)CrossRef Homayoun, S., Dehghantanha, A., Ahmadzadeh, M., Hashemi, S., Khayami, R.: Know abnormal, find evil: frequent pattern mining for ransomware threat hunting and intelligence. IEEE Trans. Emerg. Top. Comput. 8(2), 341–351 (2017)CrossRef
go back to reference Janani, R., Vijayarani, S.: Text document clustering using spectral clustering algorithm with particle swarm optimization. Expert Syst. Appl. 134, 192–200 (2019)CrossRef Janani, R., Vijayarani, S.: Text document clustering using spectral clustering algorithm with particle swarm optimization. Expert Syst. Appl. 134, 192–200 (2019)CrossRef
go back to reference Jin, X., Sun, J., Zhang, R., Zhang, Y., Zhang, C.: Specguard: Spectrum misuse detection in dynamic spectrum access systems. IEEE Trans. Mob. Comput. 17(12), 2925–2938 (2018)CrossRef Jin, X., Sun, J., Zhang, R., Zhang, Y., Zhang, C.: Specguard: Spectrum misuse detection in dynamic spectrum access systems. IEEE Trans. Mob. Comput. 17(12), 2925–2938 (2018)CrossRef
go back to reference Karimi-Maleh, H., Karimi, F., Alizadeh, M., Sanati, A.L.: Electrochemical sensors, a bright future in the fabrication of portable kits in analytical systems. Chem. Rec. 20(7), 682–692 (2020)CrossRefPubMed Karimi-Maleh, H., Karimi, F., Alizadeh, M., Sanati, A.L.: Electrochemical sensors, a bright future in the fabrication of portable kits in analytical systems. Chem. Rec. 20(7), 682–692 (2020)CrossRefPubMed
go back to reference Khraisat, A., Gondal, I., Vamplew, P., Kamruzzaman, J.: Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity 2(1), 1–22 (2019)CrossRef Khraisat, A., Gondal, I., Vamplew, P., Kamruzzaman, J.: Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity 2(1), 1–22 (2019)CrossRef
go back to reference Landauer, M., Skopik, F., Wurzenberger, M., Rauber, A.: System log clustering approaches for cyber security applications: a survey. Comput. Secur. 92, 101739 (2020)CrossRef Landauer, M., Skopik, F., Wurzenberger, M., Rauber, A.: System log clustering approaches for cyber security applications: a survey. Comput. Secur. 92, 101739 (2020)CrossRef
go back to reference Marin-Castro, H.M., Tello-Leal, E.: Event log preprocessing for process mining: a review. Appl. Sci. 11(22), 10556 (2021)CrossRef Marin-Castro, H.M., Tello-Leal, E.: Event log preprocessing for process mining: a review. Appl. Sci. 11(22), 10556 (2021)CrossRef
go back to reference Pei, J., Zhong, K., Jan, M.A., Li, J.: Personalized federated learning framework for network traffic anomaly detection. Comput. Netw. 209, 108906 (2022)CrossRef Pei, J., Zhong, K., Jan, M.A., Li, J.: Personalized federated learning framework for network traffic anomaly detection. Comput. Netw. 209, 108906 (2022)CrossRef
go back to reference Salehi, H., Burgueño, R.: Emerging artificial intelligence methods in structural engineering. Eng. Struct. 171, 170–189 (2018)CrossRef Salehi, H., Burgueño, R.: Emerging artificial intelligence methods in structural engineering. Eng. Struct. 171, 170–189 (2018)CrossRef
go back to reference Sanusi, I.T., Oyelere, S.S., Omidiora, J.O.: Exploring teachers’ preconceptions of teaching machine learning in high school: a preliminary insight from Africa. Comput. Educ. Open 3, 100072 (2022)CrossRef Sanusi, I.T., Oyelere, S.S., Omidiora, J.O.: Exploring teachers’ preconceptions of teaching machine learning in high school: a preliminary insight from Africa. Comput. Educ. Open 3, 100072 (2022)CrossRef
go back to reference Saranya, T., Sridevi, S., Deisy, C., Chung, T.D., Khan, M.A.: Performance analysis of machine learning algorithms in intrusion detection system: a review. Proced. Comput. Sci. 171, 1251–1260 (2020)CrossRef Saranya, T., Sridevi, S., Deisy, C., Chung, T.D., Khan, M.A.: Performance analysis of machine learning algorithms in intrusion detection system: a review. Proced. Comput. Sci. 171, 1251–1260 (2020)CrossRef
Metadata
Title
Flow monitoring system and abnormal log traffic mode detection based on artificial intelligence
Authors
Jinghua Cao
Bo Pan
Xiang Zou
Publication date
01-01-2024
Publisher
Springer US
Published in
Optical and Quantum Electronics / Issue 1/2024
Print ISSN: 0306-8919
Electronic ISSN: 1572-817X
DOI
https://doi.org/10.1007/s11082-023-05690-z

Other articles of this Issue 1/2024

Optical and Quantum Electronics 1/2024 Go to the issue