Skip navigation

DSpace

機構典藏 DSpace 系統致力於保存各式數位資料(如:文字、圖片、PDF)並使其易於取用。

點此認識 DSpace
DSpace logo
English
中文
  • 瀏覽論文
    • 校院系所
    • 出版年
    • 作者
    • 標題
    • 關鍵字
    • 指導教授
  • 搜尋 TDR
  • 授權 Q&A
    • 我的頁面
    • 接受 E-mail 通知
    • 編輯個人資料
  1. NTU Theses and Dissertations Repository
  2. 管理學院
  3. 資訊管理學系
請用此 Handle URI 來引用此文件: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/94103
完整後設資料紀錄
DC 欄位值語言
dc.contributor.advisor陳建錦zh_TW
dc.contributor.advisorChien Chin Chenen
dc.contributor.author陳冠甫zh_TW
dc.contributor.authorGuan-Fu Chenen
dc.date.accessioned2024-08-14T16:42:26Z-
dc.date.available2024-08-15-
dc.date.copyright2024-08-14-
dc.date.issued2024-
dc.date.submitted2024-08-01-
dc.identifier.citationDmitracova, O., Cooban, A., Liu, J., & Nam, M. (2024, March 15). McDonald’s stores hit by global IT failure. CNN. Retrieved from https://edition.cnn.com/2024/03/15/business/mcdonalds-systems failure/index.html.
W. Xu, L. Huang, A. Fox, D. Patterson, and M. I. Jordan, "Detecting large-scale system problems by mining console logs," in Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles (SOSP '09), New York, NY, USA, 2009, pp. 117-132, doi: 10.1145/1629575.1629587.
J. G. Lou, Q. Fu, S. Yang, Y. Xu, and J. Li, "Mining invariants from console logs for system problem detection," in Proceedings of the 2010 USENIX Annual Technical Conference (USENIX ATC 10), 2010, pp. 24-24.
Q. Lin, H. Zhang, J. G. Lou, Y. Zhang, and X. Chen, "Log clustering based problem identification for online service systems," in Proceedings of the 38th International Conference on Software Engineering Companion (ICSE '16), New York, NY, USA, 2016, pp. 102-111, doi: 10.1145/2889160.2889232.
B. Zhang, H. Zhang, V. H. Le, P. Moscato, and A. Zhang, "Semi-supervised and unsupervised anomaly detection by mining numerical workflow relations from system logs," Automated Software Engineering, vol. 30, no. 1, 2023, Art no. 4, doi: 10.1007/s10515-022-00370-w.
M. Du, F. Li, G. Zheng, and V. Srikumar, "Deeplog: Anomaly detection and diagnosis from system logs through deep learning," in Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS '17), New York, NY, USA, 2017, pp. 1285-1298, doi: 10.1145/3133956.3134015.
X. Zhang, Y. Xu, Q. Lin, B. Qiao, H. Zhang, Y. Dang, C. Xie, X. Yang, Q. Cheng, Z. Li, J. Chen, X. He, R. Yao, J. G. Lou, M. Chintalapati, F. Shen, and D. Zhang, "Robust log-based anomaly detection on unstable log data," in Proceedings of the 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE 2019), New York, NY, USA, 2019, pp. 807-817, doi: 10.1145/3338906.3338931.
H. Guo, S. Yuan, and X. Wu, "Logbert: Log anomaly detection via bert," in 2021 International Joint Conference on Neural Networks (IJCNN), Shenzhen, China, 2021, pp. 1-8, doi: 10.1109/IJCNN52387.2021.9534113.
Y. Lee, J. Kim, and P. Kang, "Lanobert: System log anomaly detection based on bert masked language model," Applied Soft Computing, vol. 146, Oct. 2023, Art. no. 110689, doi: 10.1016/j.asoc.2023.110689.
C. Zhang, X. Wang, H. Zhang, H. Zhang, and P. Han, "Log sequence anomaly detection based on local information extraction and globally sparse transformer model," IEEE Transactions on Network and Service Management, vol. 18, no. 4, pp. 4119-4133, Dec. 2021, doi: 10.1109/TNSM.2021.3125967.
V. H. Le and H. Zhang, "Log-based anomaly detection without log parsing," in the 36th IEEE/ACM International Conference on Automated Software Engineering (ASE), Melbourne, Australia, 2021, pp. 492-504, doi: 10.1109/ASE51524.2021.9678773.
Z. Wang, J. Tian, H. Fang, L. Chen, and J. Qin, "LightLog: A lightweight temporal convolutional network for log anomaly detection on the edge," Computer Networks, vol. 203, Feb. 2022, Art no. 108616, doi: 10.1016/j.comnet.2021.108616.
Y. Wang, Y. Liu, D. Wang, and Y. Wen, "Glad-paw: Graph-based log anomaly detection by position aware weighted graph attention network," in Pacific-Asia Conference on Knowledge Discovery and Data Mining, 2021, pp. 66-77, doi: 10.1007/978-3-030-75762-5_6.
Y. Xie and K. Yang, "Log anomaly detection by adversarial autoencoders with graph feature fusion," IEEE Transactions on Reliability, vol. 73, no. 1, pp. 637-649, Mar. 2024, doi: 10.1109/TR.2023.3305376.
C. Zhang, X. Peng, C. Sha, K. Zhang, Z. Fu, X. Wu, Q. Lin, and D. Zhang, "Deeptralog: Trace-log combined microservice anomaly detection through graph-based deep learning," in Proceedings of the 44th International Conference on Software Engineering (ICSE), Pittsburgh, PA, USA, May 2022, pp. 623-634, doi: 10.1145/3510003.3510180.
Y. Xie, H. Zhang, and M. A. Babar, "LogGD: Detecting anomalies from system logs with graph neural networks," in 2022 IEEE 22nd International Conference on Software Quality, Reliability and Security (QRS), Guangzhou, China, Dec. 2022, pp. 299-310, doi: 10.1109/QRS57517.2022.00039.
Z. Sun, Z. H. Deng, J. Y. Nie, and J. Tang, "RotatE: Knowledge graph embedding by relational rotation in complex space," in Proceedings of the 7th International Conference on Learning Representations (ICLR 2019), New Orleans, LA, USA, 2019.
F. T. Liu, K. M. Ting and Z. -H. Zhou, "Isolation Forest," 2008 Eighth IEEE International Conference on Data Mining, Pisa, Italy, 2008, pp. 413-422, doi: 10.1109/ICDM.2008.17.
S. Hochreiter and J. Schmidhuber, "Long short-term memory," Neural Computation, vol. 9, no. 8, pp. 1735-1780, Nov. 1997, doi: 10.1162/neco.1997.9.8.1735.
J. Devlin, M. W. Chang, K. Lee, and K. Toutanova, "Bert: Pre-training of deep bidirectional transformers for language understanding," in Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (NAACL-HLT), 2019, pp. 4171-4186, doi: 10.18653/v1/N19-1423
D. Lang, “Using SEC,” USENIX ;login: Magazine, vol. 38, no. 6, pp. 1-6, Dec. 2013.
P. He, J. Zhu, Z. Zheng, and M. R. Lyu, "Drain: An online log parsing approach with fixed depth tree," in 2017 IEEE International Conference on Web Services (ICWS), Honolulu, HI, USA, 2017, pp. 33-40, doi: 10.1109/ICWS.2017.13.
K. Bollacker, C. Evans, P. Paritosh, T. Sturge, and J. Taylor, "Freebase: A collaboratively created graph database for structuring human knowledge," In Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data, Vancouver, BC, Canada, 2008, pp. 1247–1250.
Antoine Bordes, Nicolas Usunier, Alberto Garcia-Durán, Jason Weston, and Oksana Yakhnenko, "Translating embeddings for modeling multi-relational data, " In Proceedings of the 26th International Conference on Neural Information Processing Systems - Volume 2 (NIPS'13). Curran Associates Inc., Red Hook, NY, USA, 2787–2795, 2013.
Z. Wang, J. Zhang, J. Feng, and Z. Chen, "Knowledge Graph Embedding by Translating on Hyperplanes," In Proceedings of the AAAI Conference on Artificial Intelligence, Québec City, QC, Canada, vol. 28, no. 1, 2014.
B. R. Preiss, Data Structures and Algorithms with Object-Oriented Design Patterns in Java. New York, NY, USA: Wiley, 1999.
-
dc.identifier.urihttp://tdr.lib.ntu.edu.tw/jspui/handle/123456789/94103-
dc.description.abstract由於需要大量監控機器狀態,日誌異常檢測已成為熱門的研究課題。然而,以往基於機器學習的方法使用標記數據進行模型訓練,既耗時又有所限制。此外,過去文獻中較少關注基於圖形建構的檢測模型。因此,我們提出了一種基於知識圖譜(Knowledge Graph)的新方法,來學習日誌模板的潛空間,以實現無監督式的模型訓練。知識圖譜能夠學習日誌之間的關係,並透過這些關係來檢測系統異常運作。除此之外,我們進一步結合孤立森林(Isolation Forest),使模型能夠自動決定閾值。相比於以往的研究,該模型在無監督式日誌異常檢測方面表現良好。
第一章介紹研究主題,並提出研究的理論依據。第二章回顧過去文獻,重點討論日誌檢測方法與知識圖譜,並關注無監督式異常檢測模型的問題。第三章展示研究方法與架構,描述如何利用知識圖譜建構日誌檢測模型,並與孤立森林模型結合。第四章呈現實驗結果,將本研究模型與近年來的最佳模型進行比較,並探討不同參數對模型表現的影響。第五章總結研究結論。
zh_TW
dc.description.abstractWith the huge need for monitoring machine status, log anomaly detection has become a popular research topic. However, previous research on machine learning-based methods uses labeled data for model training, which is time-consuming and limited. We propose a new method based on a knowledge graph to learn the latent space of the log templates without labeled data. This method is further integrated with an isolation forest to automatically decide the threshold. The model shows good performance compared to previous research on unsupervised log anomaly detection models.en
dc.description.provenanceSubmitted by admin ntu (admin@lib.ntu.edu.tw) on 2024-08-14T16:42:25Z
No. of bitstreams: 0
en
dc.description.provenanceMade available in DSpace on 2024-08-14T16:42:26Z (GMT). No. of bitstreams: 0en
dc.description.tableofcontents口試委員會審定書 i
誌謝 ii
中文摘要 iii
THESIS ABSTRACT iv
Chapter 1 Introduction 1
Chapter 2 Related Work 4
2.1 Statistical based machine learning methods 4
2.2 Deep learning methods 5
2.3 Graph-based machine learning methods 6
2.4 Unsupervised Learning Methods 7
2.5 Log Parser 8
2.6 Knowledge Graph 8
Chapter 3 Methodology 10
3.1 Log Processing 10
3.2 Knowledge Graph Construction and Embedding Generation 12
3.3 Anomaly Detection 15
Chapter 4 Experiments 19
4.1 Experimental Dataset and Settings 19
4.2 Comparisons with other Log Abnormal Detection Systems 20
4.3 Ablation Study 21
Chapter 5 Conclusion 24
Reference 25
-
dc.language.isoen-
dc.subject日誌異常檢測zh_TW
dc.subject知識圖譜zh_TW
dc.subject孤立森林zh_TW
dc.subject無監督式學習zh_TW
dc.subjectknowledge graphen
dc.subjectunsupervised learningen
dc.subjectlog anomaly detectionen
dc.subjectisolation foresten
dc.title基於知識圖譜之無監督學習日誌異常檢測zh_TW
dc.titleUnsupervised Learning Log Anomaly Detection with Knowledge Graphen
dc.typeThesis-
dc.date.schoolyear112-2-
dc.description.degree碩士-
dc.contributor.oralexamcommittee陳孟彰;張詠淳zh_TW
dc.contributor.oralexamcommitteeMeng Chang Chen;Yung-Chun Changen
dc.subject.keyword日誌異常檢測,知識圖譜,孤立森林,無監督式學習,zh_TW
dc.subject.keywordlog anomaly detection,knowledge graph,unsupervised learning,isolation forest,en
dc.relation.page28-
dc.identifier.doi10.6342/NTU202402685-
dc.rights.note未授權-
dc.date.accepted2024-08-05-
dc.contributor.author-college管理學院-
dc.contributor.author-dept資訊管理學系-
顯示於系所單位:資訊管理學系

文件中的檔案:
檔案 大小格式 
ntu-112-2.pdf
  未授權公開取用
4.08 MBAdobe PDF
顯示文件簡單紀錄


系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved