A survey on automated log analysis for reliability engineering

S He, P He, Z Chen, T Yang, Y Su, MR Lyu - ACM computing surveys …, 2021 - dl.acm.org
Logs are semi-structured text generated by logging statements in software source code. In
recent decades, software logs have become imperative in the reliability assurance …

A survey of software log instrumentation

B Chen, ZM Jiang - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Log messages have been used widely in many software systems for a variety of purposes
during software development and field operation. There are two phases in software logging …

Experience report: System log analysis for anomaly detection

S He, J Zhu, P He, MR Lyu - 2016 IEEE 27th international …, 2016 - ieeexplore.ieee.org
Anomaly detection plays an important role in management of modern large-scale distributed
systems. Logs, which record system runtime information, are widely used for anomaly …

An evaluation study on log parsing and its use in log mining

P He, J Zhu, S He, J Li, MR Lyu - 2016 46th annual IEEE/IFIP …, 2016 - ieeexplore.ieee.org
Logs, which record runtime information of modern systems, are widely utilized by developers
(and operators) in system development and maintenance. Due to the ever-increasing size of …

Towards automated log parsing for large-scale log data analysis

P He, J Zhu, S He, J Li, MR Lyu - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Logs are widely used in system management for dependability assurance because they are
often the only data available that record detailed system runtime behaviors in production …

Identifying impactful service system problems via log analysis

S He, Q Lin, JG Lou, H Zhang, MR Lyu… - Proceedings of the 2018 …, 2018 - dl.acm.org
Logs are often used for troubleshooting in large-scale software systems. For a cloud-based
online system that provides 24/7 service, a huge number of logs could be generated every …

A large-scale evaluation for log parsing techniques: How far are we?

Z Jiang, J Liu, J Huang, Y Li, Y Huo, J Gu… - Proceedings of the 33rd …, 2024 - dl.acm.org
Log data have facilitated various tasks of software development and maintenance, such as
testing, debugging and diagnosing. Due to the unstructured nature of logs, log parsing is …

OmegaLog: High-fidelity attack investigation via transparent multi-layer log analysis

WU Hassan, MA Noureddine, P Datta… - Network and distributed …, 2020 - par.nsf.gov
Recent advances in causality analysis have enabled investigators to trace multi-stage
attacks using whole-system provenance graphs. Based on system-layer audit logs (eg …

Exploring the effectiveness of llms in automated logging generation: An empirical study

Y Li, Y Huo, Z Jiang, R Zhong, P He, Y Su… - arXiv preprint arXiv …, 2023 - arxiv.org
Automated logging statement generation supports developers in documenting critical
software runtime behavior. Given the great success in natural language generation and …

Influence maximization in dynamic social networks

H Zhuang, Y Sun, J Tang, J Zhang… - 2013 IEEE 13th …, 2013 - ieeexplore.ieee.org
Social influence and influence diffusion has been widely studied in online social networks.
However, most existing works on influence diffusion focus on static networks. In this paper …