Another case of log file anomaly detection is shown.
<p>The latest log file on each virtual machine at time T is the object to be detected Discriminator is a detection system. Normal and Anormal represent the two categories into which the log files are divided. In one case (<a href="http://www.plosone.org/article/info:doi/10.1371/journal...
Saved in:
| Main Author: | |
|---|---|
| Other Authors: | , , , , |
| Published: |
2025
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1852023857346510848 |
|---|---|
| author | Hao Zhang (15339) |
| author2 | Yun Zhou (308977) Huahu Xu (20521389) Jiangang Shi (402247) Xinhua Lin (538781) Yiqin Gao (5236673) |
| author2_role | author author author author author |
| author_facet | Hao Zhang (15339) Yun Zhou (308977) Huahu Xu (20521389) Jiangang Shi (402247) Xinhua Lin (538781) Yiqin Gao (5236673) |
| author_role | author |
| dc.creator.none.fl_str_mv | Hao Zhang (15339) Yun Zhou (308977) Huahu Xu (20521389) Jiangang Shi (402247) Xinhua Lin (538781) Yiqin Gao (5236673) |
| dc.date.none.fl_str_mv | 2025-01-07T18:25:41Z |
| dc.identifier.none.fl_str_mv | 10.1371/journal.pone.0315897.g005 |
| dc.relation.none.fl_str_mv | https://figshare.com/articles/figure/Another_case_of_log_file_anomaly_detection_is_shown_/28153410 |
| dc.rights.none.fl_str_mv | CC BY 4.0 info:eu-repo/semantics/openAccess |
| dc.subject.none.fl_str_mv | Science Policy Biological Sciences not elsewhere classified Mathematical Sciences not elsewhere classified Information Systems not elsewhere classified virtual machine platform support vector machine strong sequential patterns method called ladsvm indicate security risks feature extraction algorithm experimental results demonstrate dimensional latent space virtual machine logs log parsing algorithm performance may vary ladsvm approach excels extract key features combines long short identify abnormal logs disordered log data long short extract features parsing logs abnormal logs log information dimensional input traditional methods term memory system failures svm ). specific characteristics real world prior knowledge paper proposes often challenging meaningful task large quantities increase robustness detecting anomalies anomaly detection anomaly alerts |
| dc.title.none.fl_str_mv | Another case of log file anomaly detection is shown. |
| dc.type.none.fl_str_mv | Image Figure info:eu-repo/semantics/publishedVersion image |
| description | <p>The latest log file on each virtual machine at time T is the object to be detected Discriminator is a detection system. Normal and Anormal represent the two categories into which the log files are divided. In one case (<a href="http://www.plosone.org/article/info:doi/10.1371/journal.pone.0315897#pone.0315897.g004" target="_blank">Fig 4</a>), <i>T</i><sub>3</sub> is a noisy normal log file alerted as an anomaly. In another case (Fig 5), <i>T</i><sub>3</sub> is a noisy normal log file considered as normal.</p> |
| eu_rights_str_mv | openAccess |
| id | Manara_2ccbfbae3376ca825a7a1a2d6f2a2b4c |
| identifier_str_mv | 10.1371/journal.pone.0315897.g005 |
| network_acronym_str | Manara |
| network_name_str | ManaraRepo |
| oai_identifier_str | oai:figshare.com:article/28153410 |
| publishDate | 2025 |
| repository.mail.fl_str_mv | |
| repository.name.fl_str_mv | |
| repository_id_str | |
| rights_invalid_str_mv | CC BY 4.0 |
| spelling | Another case of log file anomaly detection is shown.Hao Zhang (15339)Yun Zhou (308977)Huahu Xu (20521389)Jiangang Shi (402247)Xinhua Lin (538781)Yiqin Gao (5236673)Science PolicyBiological Sciences not elsewhere classifiedMathematical Sciences not elsewhere classifiedInformation Systems not elsewhere classifiedvirtual machine platformsupport vector machinestrong sequential patternsmethod called ladsvmindicate security risksfeature extraction algorithmexperimental results demonstratedimensional latent spacevirtual machine logslog parsing algorithmperformance may varyladsvm approach excelsextract key featurescombines long shortidentify abnormal logsdisordered log datalong shortextract featuresparsing logsabnormal logslog informationdimensional inputtraditional methodsterm memorysystem failuressvm ).specific characteristicsreal worldprior knowledgepaper proposesoften challengingmeaningful tasklarge quantitiesincrease robustnessdetecting anomaliesanomaly detectionanomaly alerts<p>The latest log file on each virtual machine at time T is the object to be detected Discriminator is a detection system. Normal and Anormal represent the two categories into which the log files are divided. In one case (<a href="http://www.plosone.org/article/info:doi/10.1371/journal.pone.0315897#pone.0315897.g004" target="_blank">Fig 4</a>), <i>T</i><sub>3</sub> is a noisy normal log file alerted as an anomaly. In another case (Fig 5), <i>T</i><sub>3</sub> is a noisy normal log file considered as normal.</p>2025-01-07T18:25:41ZImageFigureinfo:eu-repo/semantics/publishedVersionimage10.1371/journal.pone.0315897.g005https://figshare.com/articles/figure/Another_case_of_log_file_anomaly_detection_is_shown_/28153410CC BY 4.0info:eu-repo/semantics/openAccessoai:figshare.com:article/281534102025-01-07T18:25:41Z |
| spellingShingle | Another case of log file anomaly detection is shown. Hao Zhang (15339) Science Policy Biological Sciences not elsewhere classified Mathematical Sciences not elsewhere classified Information Systems not elsewhere classified virtual machine platform support vector machine strong sequential patterns method called ladsvm indicate security risks feature extraction algorithm experimental results demonstrate dimensional latent space virtual machine logs log parsing algorithm performance may vary ladsvm approach excels extract key features combines long short identify abnormal logs disordered log data long short extract features parsing logs abnormal logs log information dimensional input traditional methods term memory system failures svm ). specific characteristics real world prior knowledge paper proposes often challenging meaningful task large quantities increase robustness detecting anomalies anomaly detection anomaly alerts |
| status_str | publishedVersion |
| title | Another case of log file anomaly detection is shown. |
| title_full | Another case of log file anomaly detection is shown. |
| title_fullStr | Another case of log file anomaly detection is shown. |
| title_full_unstemmed | Another case of log file anomaly detection is shown. |
| title_short | Another case of log file anomaly detection is shown. |
| title_sort | Another case of log file anomaly detection is shown. |
| topic | Science Policy Biological Sciences not elsewhere classified Mathematical Sciences not elsewhere classified Information Systems not elsewhere classified virtual machine platform support vector machine strong sequential patterns method called ladsvm indicate security risks feature extraction algorithm experimental results demonstrate dimensional latent space virtual machine logs log parsing algorithm performance may vary ladsvm approach excels extract key features combines long short identify abnormal logs disordered log data long short extract features parsing logs abnormal logs log information dimensional input traditional methods term memory system failures svm ). specific characteristics real world prior knowledge paper proposes often challenging meaningful task large quantities increase robustness detecting anomalies anomaly detection anomaly alerts |