Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








12 Hits in 2.9 sec

UniLog: Deploy One Model and Specialize it for All Log Analysis Tasks [article]

Yichen Zhu and Weibin Meng and Ying Liu and Shenglin Zhang and Tao Han and Shimin Tao and Dan Pei
2021 arXiv   pre-print
UniLog: Deploy One Model and Specialize it for All Log Analysis Tasks  ...  Logparse: Making log parsing adaptive through word classification.  ...  This improvement is non-trivial, since adaptively classify log based on the word.  ... 
arXiv:2112.03159v1 fatcat:zqiycpha7vd3xmpey4loxbrd3a

Interpretable Online Log Analysis Using Large Language Models with Prompt Strategies [article]

Yilun Liu, Shimin Tao, Weibin Meng, Jingyu Wang, Wenbing Ma, Yanqing Zhao, Yuhang Chen, Hao Yang, Yanfei Jiang, Xun Chen
2024 arXiv   pre-print
Existing methods perform tasks such as log parsing and log anomaly detection by providing a single prediction value without interpretation.  ...  LogPrompt also exhibits remarkable compatibility with open-source and smaller-scale LLMs, making it flexible for practical deployment.  ...  through domain adaptation technologies.  ... 
arXiv:2308.07610v2 fatcat:lhfwg5niibaxpcxo6pb3nuivei

System Log Parsing: A Survey [article]

Tianzhu Zhang, Han Qiu, Gabriele Castellano, Myriana Rifai, Chung Shue Chen, Fabio Pianese
2022 arXiv   pre-print
This paper aims to provide a comprehensive survey on log parsing. We begin with an exhaustive taxonomy of existing log parsers.  ...  Log parsing closes this gap by converting the unstructured system logs to structured records. Many parsers were proposed during the last decades to accommodate various log analysis applications.  ...  As log messages usually have heterogeneous characteristics, the data classification phase may fail to adapt to all the possible formats and lead to over-or under-parsing.  ... 
arXiv:2212.14277v1 fatcat:hos64axotzhffm3544c64pcvdi

The Kerf toolkit for intrusion analysis

J. Aslam, S. Bratus, D. Kotz, R. Peterson, B. Tofel, D. Rus
2004 IEEE Security and Privacy  
Thus, it is important to securely forward and store logging information off the host. (For more information on remote logging, see the "Remote logging in practice" sidebar.)  ...  Secure logging. After successfully compromising a system, most hackers remove traces of their intrusion from the system's logs.  ...  We thank Giovanni Vigna and George Bakos for their helpful discussions and for help locating host and network log data.  ... 
doi:10.1109/msp.2004.113 fatcat:n2yiuunsdzgtrpdx554bnk6qoa

A survey on forensic investigation of operating system logs

Hudan Studiawan, Ferdous Sohel, Christian Payne
2019 Digital Investigation. The International Journal of Digital Forensics and Incident Response  
Additionally, we discuss the tools that support the examination of the event logs.  ...  Finally, we suggest potential future directions on the topic of operating system log forensics.  ...  log parsing of Windows logs.  ... 
doi:10.1016/j.diin.2019.02.005 fatcat:mtfwrofxhzedtkmchfjabplw3y

Developing Hands-on Labs for Source Code Vulnerability Detection with AI [article]

Maryam Taeb
2023 arXiv   pre-print
the software development lifecycle In this thesis our goal is to design learning modules with a set of hands on labs that will introduce students to secure programming practices using source code and log  ...  mitigation techniques integrate concepts of source code vulnerabilities from Function API and library level to bad programming habits and practices leverage deep learning NLP and static analysis tools for log  ...  to perform log file parsing using CyBERT.  ... 
arXiv:2302.00750v1 fatcat:mi3ajgccujfs3a2iqrrjqsyssy

A System for Automatic Information Extraction from Log Files

Anubhav Chhabra, University, My
2022
The first step in log analysis generally includes understanding and segregating the various logical components within a log line, termed log parsing.  ...  The reasons mentioned above make the traditional log parsers time-consuming, hard to maintain, prone to errors, and not a scalable approach.  ...  NER-LogParser makes use of a Bidirectional Long Short Term Memory (BiLSTM) based architecture to carry out NER for log files.  ... 
doi:10.20381/ruor-28126 fatcat:zf3n7tmi7bepld7qh5ewazmzai

Data-stream driven Fuzzy-granular approaches for system maintenance

Leticia Decker De Sousa
2022
Claudio Grandi, for all support and opportunities during these four years of hard work, being always available to support me through the crooked paths of the Italian immigration bureaucracy.  ...  To Marina Gherardi and Giuseppe Guglielmi that always treated me as a daughter, making me feel welcome. To you, my deepest recognition.  ...  The LogParse method [102] is proposed as an adaptive framework based on word classification. It learns template features using an open-source toolkit.  ... 
doi:10.48676/unibo/amsdottorato/10273 fatcat:x3cxyn6iuvaxhcuehx5otrewvi

Toward incorporating a task-stage identification technique into the long-term document support process

I-Chin Wu, Duen-Ren Liu, Pei-Cheng Chang
2008 Information Processing & Management  
The identified task-stage is then incorporated into a profile adaptation process to generate the worker's current task profile.  ...  The logparsing engine in the user behavior tracker analyzes log-files that track the user's interaction with the system.  ...  In summary, the log-parsing engine collects and manages task-relevant information by tracking a user's document access behavior for a specific task.  ... 
doi:10.1016/j.ipm.2007.11.005 fatcat:bvu3a6mokvgvnod7qwhjkruxeq

The Kerf toolkit for intrusion analysis

J. Aslam, S. Bratus, D. Kotz, R. Peterson, D. Rus, B. Tofel
IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003.  
The Kerf Toolkit includes a mechanism for securely recording host and network logging information for a network of workstations, a domain-specific language for querying this stored data, and an interface  ...  We thank Giovanni Vigna and George Bakos for their helpful discussions, and for help locating host and network log data.  ...  The only service is the logging service, so the only attack is through the logging service.  ... 
doi:10.1109/smcsia.2003.1232441 fatcat:6eai2pzrv5cpjiygj3cmgg42ym

Automated Diagnosis of Chronic Performance Problems in Production Systems

Soila Kavulya
2018
First, an extensible log-analysis framework that extracts end-to-end causal flows using common white-box (i.e., application) logs in the production system; these end-to-end flows capture the user's experience  ...  We identify the data-flow dependencies on a per-DataNode basis by parsing the hostnames jointly with the log-messages in the DataNode log.  ...  call that passes through in white-box logs known as call-detail-records (CDRs).  ... 
doi:10.1184/r1/6714914.v1 fatcat:ebfo5m5mmnffdopssm6m5py4ze

Automated Digital Forensics and Computer Crime Profiling

Mahmood Al Fahdi, Plymouth University, Faculty Of Science And Engineering
2016
Indexing The Indexing component permits parsing of the data so that it gets stored in a manner that makes information retrieval efficient later on.  ...  Amongst these areas, the usability, reliability, acceptance and adaptation to evolving threats are the basic requirements for any forensic methodologies; in other words, a new methodology or tool will  ...  Through the integrated components, the proposed AFE enables the digital investigators to perform the analysis in an automated fashion.  ... 
doi:10.24382/dspace/154 fatcat:bpohhgl7z5ashkx7zknzcwtjoq