Deep Learning for System Trace Restoration

04/10/2019
by   Ilia Sucholutsky, et al.
1

Most real-world datasets, and particularly those collected from physical systems, are full of noise, packet loss, and other imperfections. However, most specification mining, anomaly detection and other such algorithms assume, or even require, perfect data quality to function properly. Such algorithms may work in lab conditions when given clean, controlled data, but will fail in the field when given imperfect data. We propose a method for accurately reconstructing discrete temporal or sequential system traces affected by data loss, using Long Short-Term Memory Networks (LSTMs). The model works by learning to predict the next event in a sequence of events, and uses its own output as an input to continue predicting future events. As a result, this method can be used for data restoration even with streamed data. Such a method can reconstruct even long sequence of missing events, and can also help validate and improve data quality for noisy data. The output of the model will be a close reconstruction of the true data, and can be fed to algorithms that rely on clean data. We demonstrate our method by reconstructing automotive CAN traces consisting of long sequences of discrete events. We show that given even small parts of a CAN trace, our LSTM model can predict future events with an accuracy of almost 90 original trace, greatly outperforming a Markov Model benchmark. We separately feed the original, lossy, and reconstructed traces into a specification mining framework to perform downstream analysis of the effect of our method on state-of-the-art models that use these traces for understanding the behavior of complex systems.

READ FULL TEXT

page 1

page 6

research
12/01/2016

Anomaly Detection in Video Using Predictive Convolutional Long Short-Term Memory Networks

Automating the detection of anomalous events within long video sequences...
research
10/29/2020

LSTM for Model-Based Anomaly Detection in Cyber-Physical Systems

Anomaly detection is the task of detecting data which differs from the n...
research
04/29/2020

Mining Message Flows using Recurrent Neural Networks for System-on-Chip Designs

Comprehensive specifications are essential for various activities across...
research
07/10/2019

Runtime Verification For Timed Event Streams With Partial Information

Runtime Verification (RV) studies how to analyze execution traces of a s...
research
12/27/2020

Recomposition vs. Prediction: A Novel Anomaly Detection for Discrete Events Based On Autoencoder

One of the most challenging problems in the field of intrusion detection...
research
12/12/2019

GPRInvNet: Deep Learning-Based Ground Penetrating Radar Data Inversion for Tunnel Lining

A DNN architecture called GPRInvNet is proposed to tackle the challenge ...
research
02/28/2022

DistAD: Software Anomaly Detection Based on Execution Trace Distribution

Modern software systems have become increasingly complex, which makes th...

Please sign up or login with your details

Forgot password? Click here to reset