Dividing Deep Learning Model for Continuous Anomaly Detection of
Inconsistent ICT Systems
- URL: http://arxiv.org/abs/2003.10783v1
- Date: Tue, 24 Mar 2020 11:32:00 GMT
- Title: Dividing Deep Learning Model for Continuous Anomaly Detection of
Inconsistent ICT Systems
- Authors: Kengo Tajiri and Yasuhiro Ikeda and Yuusuke Nakano and Keishiro
Watanabe
- Abstract summary: We propose an ICT-systems-monitoring method with deep learning models divided based on the correlation of log data.
When some of the log data changes, our method can continue health monitoring with the divided models which are not affected by changes in the log data.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Health monitoring is important for maintaining reliable information and
communications technology (ICT) systems. Anomaly detection methods based on
machine learning, which train a model for describing "normality" are promising
for monitoring the state of ICT systems. However, these methods cannot be used
when the type of monitored log data changes from that of training data due to
the replacement of certain equipment. Therefore, such methods may dismiss an
anomaly that appears when log data changes. To solve this problem, we propose
an ICT-systems-monitoring method with deep learning models divided based on the
correlation of log data. We also propose an algorithm for extracting the
correlations of log data from a deep learning model and separating log data
based on the correlation. When some of the log data changes, our method can
continue health monitoring with the divided models which are not affected by
changes in the log data. We present the results from experiments involving
benchmark data and real log data, which indicate that our method using divided
models does not decrease anomaly detection accuracy and a model for anomaly
detection can be divided to continue monitoring a network state even if some
the log data change.
Related papers
- What Information Contributes to Log-based Anomaly Detection? Insights from a Configurable Transformer-Based Approach [12.980238412281471]
We propose a transformer-based anomaly detection model that can capture semantic, sequential, and temporal information in the log data.
We conduct a series of experiments with different combinations of input features to evaluate the roles of different types of information in anomaly detection.
The results indicate that the event occurrence information plays a key role in identifying anomalies, while the impact of the sequential and temporal information is not significant for anomaly detection in the studied public datasets.
arXiv Detail & Related papers (2024-09-30T17:03:13Z) - DeepHYDRA: Resource-Efficient Time-Series Anomaly Detection in Dynamically-Configured Systems [3.44012349879073]
We present DeepHYDRA (Deep Hybrid DBSCAN/Reduction-Based Anomaly Detection)
It combines DBSCAN and learning-based anomaly detection.
It is shown to reliably detect different types of anomalies in both large and complex datasets.
arXiv Detail & Related papers (2024-05-13T13:47:15Z) - RAPID: Training-free Retrieval-based Log Anomaly Detection with PLM
considering Token-level information [7.861095039299132]
The need for log anomaly detection is growing, especially in real-world applications.
Traditional deep learning-based anomaly detection models require dataset-specific training, leading to corresponding delays.
We introduce RAPID, a model that capitalizes on the inherent features of log data to enable anomaly detection without training delays.
arXiv Detail & Related papers (2023-11-09T06:11:44Z) - GLAD: Content-aware Dynamic Graphs For Log Anomaly Detection [49.9884374409624]
GLAD is a Graph-based Log Anomaly Detection framework designed to detect anomalies in system logs.
We introduce GLAD, a Graph-based Log Anomaly Detection framework designed to detect anomalies in system logs.
arXiv Detail & Related papers (2023-09-12T04:21:30Z) - PULL: Reactive Log Anomaly Detection Based On Iterative PU Learning [58.85063149619348]
We propose PULL, an iterative log analysis method for reactive anomaly detection based on estimated failure time windows.
Our evaluation shows that PULL consistently outperforms ten benchmark baselines across three different datasets.
arXiv Detail & Related papers (2023-01-25T16:34:43Z) - Convolutional generative adversarial imputation networks for
spatio-temporal missing data in storm surge simulations [86.5302150777089]
Generative Adversarial Imputation Nets (GANs) and GAN-based techniques have attracted attention as unsupervised machine learning methods.
We name our proposed method as Con Conval Generative Adversarial Imputation Nets (Conv-GAIN)
arXiv Detail & Related papers (2021-11-03T03:50:48Z) - TELESTO: A Graph Neural Network Model for Anomaly Classification in
Cloud Services [77.454688257702]
Machine learning (ML) and artificial intelligence (AI) are applied on IT system operation and maintenance.
One direction aims at the recognition of re-occurring anomaly types to enable remediation automation.
We propose a method that is invariant to dimensionality changes of given data.
arXiv Detail & Related papers (2021-02-25T14:24:49Z) - Self-Attentive Classification-Based Anomaly Detection in Unstructured
Logs [59.04636530383049]
We propose Logsy, a classification-based method to learn log representations.
We show an average improvement of 0.25 in the F1 score, compared to the previous methods.
arXiv Detail & Related papers (2020-08-21T07:26:55Z) - Data-Driven Symbol Detection via Model-Based Machine Learning [117.58188185409904]
We review a data-driven framework to symbol detection design which combines machine learning (ML) and model-based algorithms.
In this hybrid approach, well-known channel-model-based algorithms are augmented with ML-based algorithms to remove their channel-model-dependence.
Our results demonstrate that these techniques can yield near-optimal performance of model-based algorithms without knowing the exact channel input-output statistical relationship.
arXiv Detail & Related papers (2020-02-14T06:58:27Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.