System log parsing: A survey

T Zhang, H Qiu, G Castellano, M Rifai… - … on Knowledge and …, 2023 - ieeexplore.ieee.org
Modern information and communication systems have become increasingly challenging to
manage. The ubiquitous system logs contain plentiful information and are thus widely …

Loggan: a log-level generative adversarial network for anomaly detection using permutation event modeling

B Xia, Y Bai, J Yin, Y Li, J Xu - Information Systems Frontiers, 2021 - Springer
Abstract System logs that trace system states and record valuable events comprise a
significant component of any computer system in our daily life. Each log contains sufficient …

A literature review and existing challenges on software logging practices: From the creation to the analysis of software logs

MA Batoun, M Sayagh, R Aghili, A Ouni, H Li - Empirical Software …, 2024 - Springer
Software logging is the practice of recording different events and activities that occur within a
software system, which are useful for different activities such as failure prediction and …

LogGAN: A sequence-based generative adversarial network for anomaly detection based on system logs

B Xia, J Yin, J Xu, Y Li - Science of Cyber Security: Second International …, 2019 - Springer
Abstract System logs which trace system states and record valuable events comprise a
significant component of any computer system in our daily life. There exist abundant …

Landscape and Taxonomy of Online Parser-Supported Log Anomaly Detection Methods

S Lupton, H Washizaki, N Yoshioka… - IEEE Access, 2024 - ieeexplore.ieee.org
As production system estates become larger and more complex, ensuring stability through
traditional monitoring approaches becomes more challenging. Rule-based monitoring is …

Log File Template Detection as a Multi-Objective Optimization Problem

E Baburaj - International Journal of Swarm Intelligence Research …, 2022 - igi-global.com
There is a need for automatic log file template detection tool to find out all the log messages
through search space. On the other hand, the template detection tool should cope with two …

[PDF][PDF] Automatisierte Fehlererkennung einer Microservice-Anwendung basierend auf Log-Dateien

V Restat - mn.h-da.de
ZUSAMMENFASSUNG Log-Dateien dokumentieren das Verhalten einer Anwendung oder
eines Systems, was deren Analyse zu einem Schlüsselfaktor für die Sicherheit, Stabilität und …

Behavior Flow Graph Construction from System Logs for Anomaly Analysis

H Ling, J Han, J Pang, J Liu, J Xu, Z Liu - Science of Cyber Security …, 2019 - Springer
Anomaly analysis plays a significant role in building a secure and reliable system. Raw
system logs contain important system information, such as execution paths and execution …

[引用][C] System Application Behavioural Profiling using Log Analysis

EV Soundariya, S Kalaiselvi, KN Mallikarjunan - System, 2020