Detecting Log Anomalies with Multi-Head Attention (LAMA)

01/07/2021
by   Yicheng Guo, et al.
0

Anomaly detection is a crucial and challenging subject that has been studied within diverse research areas. In this work, we explore the task of log anomaly detection (especially computer system logs and user behavior logs) by analyzing logs' sequential information. We propose LAMA, a multi-head attention based sequential model to process log streams as template activity (event) sequences. A next event prediction task is applied to train the model for anomaly detection. Extensive empirical studies demonstrate that our new model outperforms existing log anomaly detection methods including statistical and deep learning methodologies, which validate the effectiveness of our proposed method in learning sequence patterns of log data.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/02/2023

Graph Neural Network based Log Anomaly Detection and Explanation

Event logs are widely used to record the status of high-tech systems, ma...
research
01/13/2021

Multi-Source Anomaly Detection in Distributed IT Systems

The multi-source data generated by distributed systems, provide a holist...
research
03/01/2021

Online anomaly detection using statistical leverage for streaming business process events

While several techniques for detecting trace-level anomalies in event lo...
research
09/06/2023

A Critical Review of Common Log Data Sets Used for Evaluation of Sequence-based Anomaly Detection Techniques

Log data store event execution patterns that correspond to underlying wo...
research
01/19/2023

ClusterLog: Clustering Logs for Effective Log-based Anomaly Detection

With the increasing prevalence of scalable file systems in the context o...
research
03/29/2021

Dynamically Modelling Heterogeneous Higher-Order Interactions for Malicious Behavior Detection in Event Logs

Anomaly detection in event logs is a promising approach for intrusion de...
research
08/21/2020

Self-Attentive Classification-Based Anomaly Detection in Unstructured Logs

The detection of anomalies is essential mining task for the security and...

Please sign up or login with your details

Forgot password? Click here to reset