Detect Needle in a Haystack: Advanced Anomaly Detection mechanisms from execution logsSpeaker: Gargi Banerjee Dasgupta
Topic(s): Information Systems, Search, Information Retrieval, Database Systems, Data Mining, Data Science
Troubleshooting complex systems in IT data centers is a very complex problem. We focus on the problem of detecting anomalous run-time behavior of distributed applications from their execution logs. Specifically we mine templates and template sequences from logs to form a control flow graph (cfg) spanning distributed components. This cfg represents the baseline healthy system state and is used to flag deviations from the expected behavior of runtime logs.
The novelty in our work stems from the new techniques employed to: (1) overcome the instrumentation requirements or application specific assumptions made in prior log mining approaches, (2) improve the accuracy of mined templates and the cfg in the presence of long parameters and high amount of interleaving respectively, and (3) improve by orders of magnitude the scalability of the cfg mining process in terms of volume of log data that can be processed per day.
About this LectureNumber of Slides: 30
Duration: 45 minutes
Languages Available: English
Request this Lecture
To request this particular lecture, please complete this online form.
Request a Tour
To request a tour with this speaker, please complete this online form.
All requests will be sent to ACM headquarters for review.