Assessing Data Usefulness for Failure Analysis in Anonymized System Logs

05/04/2018
by   Siavash Ghiasvand, et al.
0

System logs are a valuable source of information for the analysis and understanding of systems behavior for the purpose of improving their performance. Such logs contain various types of information, including sensitive information. Information deemed sensitive can either directly be extracted from system log entries by correlation of several log entries, or can be inferred from the combination of the (non-sensitive) information contained within system logs with other logs and/or additional datasets. The analysis of system logs containing sensitive information compromises data privacy. Therefore, various anonymization techniques, such as generalization and suppression have been employed, over the years, by data and computing centers to protect the privacy of their users, their data, and the system as a whole. Privacy-preserving data resulting from anonymization via generalization and suppression may lead to significantly decreased data usefulness, thus, hindering the intended analysis for understanding the system behavior. Maintaining a balance between data usefulness and privacy preservation, therefore, remains an open and important challenge. Irreversible encoding of system logs using collision-resistant hashing algorithms, such as SHAKE-128, is a novel approach previously introduced by the authors to mitigate data privacy concerns. The present work describes a study of the applicability of the encoding approach from earlier work on the system logs of a production high performance computing system. Moreover, a metric is introduced to assess the data usefulness of the anonymized system logs to detect and identify the failures encountered in the system.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/13/2019

Delog: A Privacy Preserving Log Filtering Framework for Online Compute Platforms

In many software applications, logs serve as the only interface between ...
research
12/02/2022

Assessing Anonymized System Logs Usefulness for Behavioral Analysis in RNN Models

System logs are a common source of monitoring data for analyzing computi...
research
01/24/2019

Mokka: RSM for open networks

Mokka is a PC (CAP theorem) consensus algorithm for handling replicated ...
research
04/30/2021

Leveraging Machine Learning to Detect Data Curation Activities

This paper describes a machine learning approach for annotating and anal...
research
05/29/2021

Log2NS: Enhancing Deep Learning Based Analysis of Logs With Formal to Prevent Survivorship Bias

Analysis of large observational data sets generated by a reactive system...
research
09/08/2021

Knowledge Learning-based Adaptable System for Sensitive Information Identification and Handling

Diagnostic data such as logs and memory dumps from production systems ar...
research
03/18/2022

Active Meta-Learner for Log Analysis

The analysis of logs is a vital activity undertaken for cyber investigat...

Please sign up or login with your details

Forgot password? Click here to reset