A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
UniLog: Deploy One Model and Specialize it for All Log Analysis Tasks
[article]
2021
arXiv
pre-print
UniLog: Deploy One Model and Specialize it for All Log Analysis Tasks ...
Logparse: Making log parsing adaptive through word classification. ...
This improvement is non-trivial, since adaptively classify log based on the word. ...
arXiv:2112.03159v1
fatcat:zqiycpha7vd3xmpey4loxbrd3a
Interpretable Online Log Analysis Using Large Language Models with Prompt Strategies
[article]
2024
arXiv
pre-print
Existing methods perform tasks such as log parsing and log anomaly detection by providing a single prediction value without interpretation. ...
LogPrompt also exhibits remarkable compatibility with open-source and smaller-scale LLMs, making it flexible for practical deployment. ...
through domain adaptation technologies. ...
arXiv:2308.07610v2
fatcat:lhfwg5niibaxpcxo6pb3nuivei
System Log Parsing: A Survey
[article]
2022
arXiv
pre-print
This paper aims to provide a comprehensive survey on log parsing. We begin with an exhaustive taxonomy of existing log parsers. ...
Log parsing closes this gap by converting the unstructured system logs to structured records. Many parsers were proposed during the last decades to accommodate various log analysis applications. ...
As log messages usually have heterogeneous characteristics, the data classification phase may fail to adapt to all the possible formats and lead to over-or under-parsing. ...
arXiv:2212.14277v1
fatcat:hos64axotzhffm3544c64pcvdi
The Kerf toolkit for intrusion analysis
2004
IEEE Security and Privacy
Thus, it is important to securely forward and store logging information off the host. (For more information on remote logging, see the "Remote logging in practice" sidebar.) ...
Secure logging. After successfully compromising a system, most hackers remove traces of their intrusion from the system's logs. ...
We thank Giovanni Vigna and George Bakos for their helpful discussions and for help locating host and network log data. ...
doi:10.1109/msp.2004.113
fatcat:n2yiuunsdzgtrpdx554bnk6qoa
A survey on forensic investigation of operating system logs
2019
Digital Investigation. The International Journal of Digital Forensics and Incident Response
Additionally, we discuss the tools that support the examination of the event logs. ...
Finally, we suggest potential future directions on the topic of operating system log forensics. ...
log parsing of Windows logs. ...
doi:10.1016/j.diin.2019.02.005
fatcat:mtfwrofxhzedtkmchfjabplw3y
Developing Hands-on Labs for Source Code Vulnerability Detection with AI
[article]
2023
arXiv
pre-print
the software development lifecycle In this thesis our goal is to design learning modules with a set of hands on labs that will introduce students to secure programming practices using source code and log ...
mitigation techniques integrate concepts of source code vulnerabilities from Function API and library level to bad programming habits and practices leverage deep learning NLP and static analysis tools for log ...
to perform log file parsing using CyBERT. ...
arXiv:2302.00750v1
fatcat:mi3ajgccujfs3a2iqrrjqsyssy
A System for Automatic Information Extraction from Log Files
2022
The first step in log analysis generally includes understanding and segregating the various logical components within a log line, termed log parsing. ...
The reasons mentioned above make the traditional log parsers time-consuming, hard to maintain, prone to errors, and not a scalable approach. ...
NER-LogParser makes use of a Bidirectional Long Short Term Memory (BiLSTM) based architecture to carry out NER for log files. ...
doi:10.20381/ruor-28126
fatcat:zf3n7tmi7bepld7qh5ewazmzai
Data-stream driven Fuzzy-granular approaches for system maintenance
2022
Claudio Grandi, for all support and opportunities during these four years of hard work, being always available to support me through the crooked paths of the Italian immigration bureaucracy. ...
To Marina Gherardi and Giuseppe Guglielmi that always treated me as a daughter, making me feel welcome. To you, my deepest recognition. ...
The LogParse method [102] is proposed as an adaptive framework based on word classification. It learns template features using an open-source toolkit. ...
doi:10.48676/unibo/amsdottorato/10273
fatcat:x3cxyn6iuvaxhcuehx5otrewvi
Toward incorporating a task-stage identification technique into the long-term document support process
2008
Information Processing & Management
The identified task-stage is then incorporated into a profile adaptation process to generate the worker's current task profile. ...
The logparsing engine in the user behavior tracker analyzes log-files that track the user's interaction with the system. ...
In summary, the log-parsing engine collects and manages task-relevant information by tracking a user's document access behavior for a specific task. ...
doi:10.1016/j.ipm.2007.11.005
fatcat:bvu3a6mokvgvnod7qwhjkruxeq
The Kerf toolkit for intrusion analysis
IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003.
The Kerf Toolkit includes a mechanism for securely recording host and network logging information for a network of workstations, a domain-specific language for querying this stored data, and an interface ...
We thank Giovanni Vigna and George Bakos for their helpful discussions, and for help locating host and network log data. ...
The only service is the logging service, so the only attack is through the logging service. ...
doi:10.1109/smcsia.2003.1232441
fatcat:6eai2pzrv5cpjiygj3cmgg42ym
Automated Diagnosis of Chronic Performance Problems in Production Systems
2018
First, an extensible log-analysis framework that extracts end-to-end causal flows using common white-box (i.e., application) logs in the production system; these end-to-end flows capture the user's experience ...
We identify the data-flow dependencies on a per-DataNode basis by parsing the hostnames jointly with the log-messages in the DataNode log. ...
call that passes through in white-box logs known as call-detail-records (CDRs). ...
doi:10.1184/r1/6714914.v1
fatcat:ebfo5m5mmnffdopssm6m5py4ze
Automated Digital Forensics and Computer Crime Profiling
2016
Indexing The Indexing component permits parsing of the data so that it gets stored in a manner that makes information retrieval efficient later on. ...
Amongst these areas, the usability, reliability, acceptance and adaptation to evolving threats are the basic requirements for any forensic methodologies; in other words, a new methodology or tool will ...
Through the integrated components, the proposed AFE enables the digital investigators to perform the analysis in an automated fashion. ...
doi:10.24382/dspace/154
fatcat:bpohhgl7z5ashkx7zknzcwtjoq