ADOps: An Anomaly Detection Pipeline in Structured Logs

被引:1
|
作者
Song, Xintong [1 ]
Zhu, Yusen [1 ]
Wu, Jianfei [1 ]
Liu, Bai [1 ]
Wei, Hongkang [1 ]
机构
[1] NetEase Fuxi AI Lab, Hangzhou, Peoples R China
来源
PROCEEDINGS OF THE VLDB ENDOWMENT | 2023年 / 16卷 / 12期
关键词
D O I
10.14778/3611540.3611618
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Anomaly detection has been extensively implemented in industry. The reality is that an application may have numerous scenarios where anomalies need to be monitored. However, the complete process of anomaly detection will take much time, including data acquisition, data processing, model training, and model deployment. In particular, some simple scenarios do not require building complex anomaly detection models. This results in a waste of resources. To solve these problems, we build an anomaly detection pipeline(ADOps) to modularize each step. For simple anomaly detection scenarios, no programming is required and new anomaly detection tasks can be created by simply modifying the configuration file. In addition, it can also improve the development efficiency of complex anomaly detection models. We show how users create anomaly detection tasks on the anomaly detection pipeline and how engineers use it to develop anomaly detection models.
引用
收藏
页码:4050 / 4053
页数:4
相关论文
共 50 条
  • [1] Converting Unstructured System Logs into Structured Event List for Anomaly Detection
    Li, Zongze
    Davidson, Matthew
    Fu, Song
    Blanchard, Sean
    Lang, Michael
    13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
  • [2] A Survey of Deep Anomaly Detection for System Logs
    Zhao, Xiaoqing
    Jiang, Zhongyuan
    Ma, Jianfeng
    2022 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2022,
  • [3] Anomaly Detection on Event Logs with a Scarcity of Labels
    Barbon Junior, Sylvio
    Ceravolo, Paolo
    Damiani, Ernesto
    Omori, Nicolas Jashchenko
    Tavares, Gabriel Marques
    2020 2ND INTERNATIONAL CONFERENCE ON PROCESS MINING (ICPM 2020), 2020, : 161 - 168
  • [4] A Comprehensive Review of Anomaly Detection in Web Logs
    Majd, Mehryar
    Najafi, Pejman
    Alhosseini, Seyed Ali
    Cheng, Feng
    Meinel, Christoph
    2022 IEEE/ACM INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING, APPLICATIONS AND TECHNOLOGIES, BDCAT, 2022, : 158 - 165
  • [5] System anomaly detection: Mining firewall logs
    Winding, Robert
    Wright, Timothy
    Chapple, Michael
    2006 SECURECOMM AND WORKSHOPS, 2006, : 389 - +
  • [6] User Profiling in Anomaly Detection of Authorization Logs
    Zamanian, Zahedeh
    Feizollah, Ali
    Anuar, Nor Badrul
    Kiah, Laiha Binti Mat
    Srikanth, Karanam
    Kumar, Sudhindra
    COMPUTATIONAL SCIENCE AND TECHNOLOGY, 2019, 481 : 59 - 65
  • [7] Anomaly Detection in Logs Using Deep Learning
    Aziz, Ayesha
    Munir, Kashif
    IEEE ACCESS, 2024, 12 : 176124 - 176135
  • [8] ANOMALY DETECTION ALGORITHMS IN BUSINESS PROCESS LOGS
    Bezerra, Fabio
    Wainer, Jacques
    ICEIS 2008: PROCEEDINGS OF THE TENTH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS, VOL AIDSS: ARTIFICIAL INTELLIGENCE AND DECISION SUPPORT SYSTEMS, 2008, : 11 - 18
  • [9] Automated EWMA Anomaly Detection Pipeline
    Gilletly, Samuel D.
    Cauthen, Katherine
    Mott, Joshua
    2022 AMERICAN CONTROL CONFERENCE, ACC, 2022, : 4203 - 4210
  • [10] Valid Probabilistic Anomaly Detection Models for System Logs
    Liu, Chunbo
    Pan, Lanlan
    Gu, Zhaojun
    Wang, Jialiang
    Ren, Yitong
    Wang, Zhi
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020