Muhammad Ahsan
My all presentation slides are placed here......:]
Muhammad Ahsan
p176142@nu.edu.pk
Iqra Fakhar
p176148@nu.edu.pk
Ayesha Aziz
p176072@nu.edu.pk
Supervisor:
Waqas Ali
September 23, 2020
Importance of logs
Critical system logs
Security and reliability
Difficulty in anomaly detection
Problem Statement
Handling real-time log anomalies
Languages Supported:
Language Utilized:
Visual Libraray:
1
5
4
3
2
6
10
9
8
7
14
13
12
11
16
15
Project Purposal
Project Defense
Literature Review
Dataset gathering
& Prepration
Data Streaming
Model Selection
Traing/Testing
Logs Clustering
User Interface
Initial Model(v0.1)
Documentation
Weeks:
Literature Review
Tasks:
1
5
4
3
2
6
10
9
8
7
14
13
12
11
16
15
Inititial Results
Models Variations
Improve Results
Finalize User Interface
Validating Benchmarks
Fine Tuning
Research Paper
Testing
Weeks:
Documentation
Tasks:
Final Results
[1] Hamooni, Hossein, et al. "Logmine: Fast pattern recognition for log analytics." Proceedings of the 25th ACM International onConference on Information and Knowledge Management. 2016.
[2] Du, Min, et al. "Deeplog: Anomaly detection and diagnosis from system logs through deep learning." Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. 2017.
[3] Landauer, Max, et al. "Dynamic log file analysis: An unsupervised cluster evolution approach for anomaly detection." computers & security 79 (2018): 94-116.
[4] Meng, Weibin, et al. "LogAnomaly: Unsupervised Detection of Sequential and Quantitative Anomalies in Unstructured Logs." IJCAI. 2019.
[5] Farzad, Amir, and T. Aaron Gulliver. "Unsupervised log message anomaly detection." ICT Express 6.3 (2020): 229-237.
[6] Wang, Jin, et al. "LogEvent2vec: LogEvent-to-Vector Based Anomaly Detection for Large-Scale Logs in Internet of Things." Sensors 20.9 (2020): 2451.
[7] Nedelkoski, Sasho, et al. "Self-Attentive Classification-Based Anomaly Detection in Unstructured Logs." arXiv preprint arXiv:2008.09340 (2020).
[8] Zhang, Xu, et al. "Robust log-based anomaly detection on unstable log data." Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. 2019.
[9] Bertero, Christophe, et al. "Experience report: Log mining using natural language processing and application to anomaly detection." 2017 IEEE 28th International Symposium on Software Reliability Engineering (ISSRE). IEEE, 2017.
By Muhammad Ahsan
AnyLog: Anomaly Detection of heterogeneous logs using deep transformer models FYP defense