skip to main content
10.1145/3340531.3412157acmconferencesArticle/Chapter ViewAbstractPublication PagescikmConference Proceedingsconference-collections
short-paper

Application Performance Anomaly Detection with LSTM on Temporal Irregularities in Logs

Published: 19 October 2020 Publication History

Abstract

Performance anomalies are a core problem in modern information systems, that affects the execution of the hosted applications. The detection of these anomalies often relies on the analysis of the application execution logs. The current most effective approach is to detect samples that differ from a learnt nominal model. However, current methods often focus on detecting sequential anomalies in logs, neglecting the time elapsed between logs, which is a core component of the performance anomaly detection. In this paper, we develop a new model for performance anomaly detection that captures temporal deviations from the nominal model, by means of a sliding window data representation. This nominal model is trained by a Long Short-Term Memory neural network, which is appropriate to represent complex sequential dependencies. We assess the effectiveness of our model on both simulated and real datasets. We show that it is more robust to temporal variations than current state-of-the-art approaches, while remaining as effective.

Supplementary Material

MP4 File (3340531.3412157.mp4)
We present NoTIL (Novelty Detection based on Temporal Irregularities in Logs), a new deep learning method to detect anomalies in logs. NoTIL has two specificities (i) it is a novelty detection approach (ii) it uses a data representation based on temporal event counts, which enables to catch temporal irregularities in logs. We demonstrate its superiority over the state-of-the-art methods for the detection of performance anomalies.

References

[1]
Xavier Baril, Oihana Coustié, Josiane Mothe, and Olivier Teste. 2020. METING: A Robust Log Parser Based on Frequent n-Gram Mining. IEEE The International Conference on Web Services (ICWS) (2020).
[2]
Sté phane Bonnevay, Jairo Cugliari, and Victoria Granger. 2019. Predictive Maintenance from Event Logs Using Wavelet-Based Features: An Industrial Application. In 14th Inter. Conf. on Soft Computing Models in Industrial and Environmental Applications (SOCO) (Advances in Intelligent Systems and Computing), Vol. 950. 132--141.
[3]
Andrea Borghesi, Antonio Libri, Luca Benini, and Andrea Bartolini. 2019. Online Anomaly Detection in HPC Systems. In IEEE Inter. Conf. on Artificial Intelligence Circuits and Systems, AICAS. 229--233.
[4]
Andy Brown, Aaron Tuor, Brian Hutchinson, and Nicole Nichols. 2018. Recurrent Neural Network Attention Mechanisms for Interpretable System Log Anomaly Detection. CoRR, Vol. abs/1803.04967 (2018). arxiv: 1803.04967
[5]
Mike Y. Chen, Alice X. Zheng, Jim Lloyd, Michael I. Jordan, and Eric A. Brewer. 2004. Failure Diagnosis Using Decision Trees. In 1st Inter. Conf. on Autonomic Computing (ICAC ). 36--43.
[6]
Min Du, Feifei Li, Guineng Zheng, and Vivek Srikumar. 2017. DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning. In Proc. of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS. 1285--1298.
[7]
Qiang Fu, Jian-Guang Lou, Yi Wang, and Jiang Li. 2009. Execution anomaly detection in distributed systems through unstructured log analysis. In 9th IEEE Inter. Conf. on data mining. 149--158.
[8]
Shilin He, Jieming Zhu, Pinjia He, and Michael R. Lyu. 2016. Experience Report: System Log Analysis for Anomaly Detection. In 27th IEEE International Symposium on Software Reliability Engineering, ISSRE. 207--218.
[9]
Yinglung Liang, Yanyong Zhang, Hui Xiong, and Ramendra K. Sahoo. 2007. Failure Prediction in IBM BlueGene/L Event Logs. In Proc. of the 7th IEEE Inter. Conf. on Data Mining (ICDM 2007). 583--588.
[10]
Jian-Guang Lou, Qiang Fu, Shengqi Yang, Ye Xu, and Jiang Li. 2010. Mining Invariants from Console Logs for System Problem Detection. In USENIX Annual Technical Conference, 2010, Paul Barham and Timothy Roscoe (Eds.).
[11]
Weibin Meng, Ying Liu, Yichen Zhu, Shenglin Zhang, Dan Pei, Yuqing Liu, Yihao Chen, Ruizhi Zhang, Shimin Tao, Pei Sun, and Rong Zhou. 2019. LogAnomaly: Unsupervised Detection of Sequential and Quantitative Anomalies in Unstructured Logs. In Proc. of the Twenty-Eighth International Joint Conference on Artificial Intelligence, IJCAI, Sarit Kraus (Ed.). 4739--4745.
[12]
Yongmin Tan, Hiep Nguyen, Zhiming Shen, Xiaohui Gu, Chitra Venkatramani, and Deepak Rajan. 2012. PREPARE: Predictive Performance Anomaly Prevention for Virtualized Cloud Systems. In IEEE 32nd Inter. Conf. on Distributed Computing Systems. 285--294.
[13]
Yifan Wu. 2018. DeepLog. https://github.com/wuyifan18/DeepLog.
[14]
Wei Xu, Ling Huang, Armando Fox, David Patterson, and Michael Jordan. 2009. Largescale system problem detection by mining console logs. (2009).
[15]
Ke Zhang, Jianwu Xu, Martin Renqiang Min, Guofei Jiang, Konstantinos Pelechrinis, and Hui Zhang. 2016. Automated IT system failure prediction: A deep learning approach. In IEEE Inter. Conf. on Big Data,. 1291--1300.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
CIKM '20: Proceedings of the 29th ACM International Conference on Information & Knowledge Management
October 2020
3619 pages
ISBN:9781450368599
DOI:10.1145/3340531
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 19 October 2020

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. anomaly detection
  2. event logs
  3. information system

Qualifiers

  • Short-paper

Conference

CIKM '20
Sponsor:

Acceptance Rates

Overall Acceptance Rate 1,861 of 8,427 submissions, 22%

Upcoming Conference

CIKM '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)37
  • Downloads (Last 6 weeks)2
Reflects downloads up to 20 Jan 2025

Other Metrics

Citations

Cited By

View all

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media