Another case of log file anomaly detection is shown.

<p>The latest log file on each virtual machine at time T is the object to be detected Discriminator is a detection system. Normal and Anormal represent the two categories into which the log files are divided. In one case (<a href="http://www.plosone.org/article/info:doi/10.1371/journal...

Full description

Saved in:
Bibliographic Details
Main Author: Hao Zhang (15339) (author)
Other Authors: Yun Zhou (308977) (author), Huahu Xu (20521389) (author), Jiangang Shi (402247) (author), Xinhua Lin (538781) (author), Yiqin Gao (5236673) (author)
Published: 2025
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1852023857346510848
author Hao Zhang (15339)
author2 Yun Zhou (308977)
Huahu Xu (20521389)
Jiangang Shi (402247)
Xinhua Lin (538781)
Yiqin Gao (5236673)
author2_role author
author
author
author
author
author_facet Hao Zhang (15339)
Yun Zhou (308977)
Huahu Xu (20521389)
Jiangang Shi (402247)
Xinhua Lin (538781)
Yiqin Gao (5236673)
author_role author
dc.creator.none.fl_str_mv Hao Zhang (15339)
Yun Zhou (308977)
Huahu Xu (20521389)
Jiangang Shi (402247)
Xinhua Lin (538781)
Yiqin Gao (5236673)
dc.date.none.fl_str_mv 2025-01-07T18:25:41Z
dc.identifier.none.fl_str_mv 10.1371/journal.pone.0315897.g005
dc.relation.none.fl_str_mv https://figshare.com/articles/figure/Another_case_of_log_file_anomaly_detection_is_shown_/28153410
dc.rights.none.fl_str_mv CC BY 4.0
info:eu-repo/semantics/openAccess
dc.subject.none.fl_str_mv Science Policy
Biological Sciences not elsewhere classified
Mathematical Sciences not elsewhere classified
Information Systems not elsewhere classified
virtual machine platform
support vector machine
strong sequential patterns
method called ladsvm
indicate security risks
feature extraction algorithm
experimental results demonstrate
dimensional latent space
virtual machine logs
log parsing algorithm
performance may vary
ladsvm approach excels
extract key features
combines long short
identify abnormal logs
disordered log data
long short
extract features
parsing logs
abnormal logs
log information
dimensional input
traditional methods
term memory
system failures
svm ).
specific characteristics
real world
prior knowledge
paper proposes
often challenging
meaningful task
large quantities
increase robustness
detecting anomalies
anomaly detection
anomaly alerts
dc.title.none.fl_str_mv Another case of log file anomaly detection is shown.
dc.type.none.fl_str_mv Image
Figure
info:eu-repo/semantics/publishedVersion
image
description <p>The latest log file on each virtual machine at time T is the object to be detected Discriminator is a detection system. Normal and Anormal represent the two categories into which the log files are divided. In one case (<a href="http://www.plosone.org/article/info:doi/10.1371/journal.pone.0315897#pone.0315897.g004" target="_blank">Fig 4</a>), <i>T</i><sub>3</sub> is a noisy normal log file alerted as an anomaly. In another case (Fig 5), <i>T</i><sub>3</sub> is a noisy normal log file considered as normal.</p>
eu_rights_str_mv openAccess
id Manara_2ccbfbae3376ca825a7a1a2d6f2a2b4c
identifier_str_mv 10.1371/journal.pone.0315897.g005
network_acronym_str Manara
network_name_str ManaraRepo
oai_identifier_str oai:figshare.com:article/28153410
publishDate 2025
repository.mail.fl_str_mv
repository.name.fl_str_mv
repository_id_str
rights_invalid_str_mv CC BY 4.0
spelling Another case of log file anomaly detection is shown.Hao Zhang (15339)Yun Zhou (308977)Huahu Xu (20521389)Jiangang Shi (402247)Xinhua Lin (538781)Yiqin Gao (5236673)Science PolicyBiological Sciences not elsewhere classifiedMathematical Sciences not elsewhere classifiedInformation Systems not elsewhere classifiedvirtual machine platformsupport vector machinestrong sequential patternsmethod called ladsvmindicate security risksfeature extraction algorithmexperimental results demonstratedimensional latent spacevirtual machine logslog parsing algorithmperformance may varyladsvm approach excelsextract key featurescombines long shortidentify abnormal logsdisordered log datalong shortextract featuresparsing logsabnormal logslog informationdimensional inputtraditional methodsterm memorysystem failuressvm ).specific characteristicsreal worldprior knowledgepaper proposesoften challengingmeaningful tasklarge quantitiesincrease robustnessdetecting anomaliesanomaly detectionanomaly alerts<p>The latest log file on each virtual machine at time T is the object to be detected Discriminator is a detection system. Normal and Anormal represent the two categories into which the log files are divided. In one case (<a href="http://www.plosone.org/article/info:doi/10.1371/journal.pone.0315897#pone.0315897.g004" target="_blank">Fig 4</a>), <i>T</i><sub>3</sub> is a noisy normal log file alerted as an anomaly. In another case (Fig 5), <i>T</i><sub>3</sub> is a noisy normal log file considered as normal.</p>2025-01-07T18:25:41ZImageFigureinfo:eu-repo/semantics/publishedVersionimage10.1371/journal.pone.0315897.g005https://figshare.com/articles/figure/Another_case_of_log_file_anomaly_detection_is_shown_/28153410CC BY 4.0info:eu-repo/semantics/openAccessoai:figshare.com:article/281534102025-01-07T18:25:41Z
spellingShingle Another case of log file anomaly detection is shown.
Hao Zhang (15339)
Science Policy
Biological Sciences not elsewhere classified
Mathematical Sciences not elsewhere classified
Information Systems not elsewhere classified
virtual machine platform
support vector machine
strong sequential patterns
method called ladsvm
indicate security risks
feature extraction algorithm
experimental results demonstrate
dimensional latent space
virtual machine logs
log parsing algorithm
performance may vary
ladsvm approach excels
extract key features
combines long short
identify abnormal logs
disordered log data
long short
extract features
parsing logs
abnormal logs
log information
dimensional input
traditional methods
term memory
system failures
svm ).
specific characteristics
real world
prior knowledge
paper proposes
often challenging
meaningful task
large quantities
increase robustness
detecting anomalies
anomaly detection
anomaly alerts
status_str publishedVersion
title Another case of log file anomaly detection is shown.
title_full Another case of log file anomaly detection is shown.
title_fullStr Another case of log file anomaly detection is shown.
title_full_unstemmed Another case of log file anomaly detection is shown.
title_short Another case of log file anomaly detection is shown.
title_sort Another case of log file anomaly detection is shown.
topic Science Policy
Biological Sciences not elsewhere classified
Mathematical Sciences not elsewhere classified
Information Systems not elsewhere classified
virtual machine platform
support vector machine
strong sequential patterns
method called ladsvm
indicate security risks
feature extraction algorithm
experimental results demonstrate
dimensional latent space
virtual machine logs
log parsing algorithm
performance may vary
ladsvm approach excels
extract key features
combines long short
identify abnormal logs
disordered log data
long short
extract features
parsing logs
abnormal logs
log information
dimensional input
traditional methods
term memory
system failures
svm ).
specific characteristics
real world
prior knowledge
paper proposes
often challenging
meaningful task
large quantities
increase robustness
detecting anomalies
anomaly detection
anomaly alerts