Skip to main content

EDSLog: Efficient Log Anomaly Detection Method Based on Dataset Partitioning

  • Conference paper
  • First Online:
Dependable Software Engineering. Theories, Tools, and Applications (SETTA 2024)

Abstract

With the growing demand for computility, the reliability of computility services has become increasingly crucial. Due to the escalating volume and complexity of tasks processed, computility services often need to operate under high load, which can easily lead to issues such as resource shortages and service interruptions. Logs in computility services meticulously record the operational information of each component; therefore, anomaly detection based on logs can effectively ensure the stable operation of computility services. This study aims to address two challenges in the field of log anomaly detection. First, this study addresses the previously overlooked issue of class-imbalanced log data. Second, given the massive volumes of log data, the time required for model training poses a significant challenge. To address these issues, we propose EDSLog, a novel efficient log anomaly detection framework based on dataset partitioning. Initially, EDSLog processes log sequences through the Weight-Based K-fold Sub Hold-out Method (WKHM), effectively alleviating the class-imbalance problem. Subsequently, EDSLog leverages Simple Recurrent Units (SRU) enhanced by a self-attention mechanism to extract features from log sequences. Finally, EDSLog determines whether the predicted log data are anomalous. Experiments show that EDSLog achieves the best evaluation metrics in class-imbalanced datasets while having the shortest total model runtime. Specifically, EDSLog achieved the highest F1 scores of 100 and 99.96 respectively on the BGL and HDFS datasets, where abnormal logs account for 0.1% of the data. Additionally, EDSLog’s training speed was 35.62% faster than the model with the second shortest training duration among all models compared.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Aydın, H., Orman, Z., Aydın, M.A.: A long short-term memory (LSTM)-based distributed denial of service (DDoS) detection and defense system design in public cloud network environment. Comput. Secur. 118, 102725 (2022)

    Article  Google Scholar 

  2. Chen, A., Fu, Y., Zheng, X., Lu, G.: An efficient network behavior anomaly detection using a hybrid DBN-LSTM network. Comput. Secur. 114, 102600 (2022)

    Article  Google Scholar 

  3. Roy, S., et al.: Why don’t XAI techniques agree? Characterizing the disagreements between post-hoc explanations of defect predictions. In: Proceedings of IEEE International Conference on Software Maintenance and Evolution (ICSME), pp. 444–448 (2022)

    Google Scholar 

  4. Du, M., Li, F., Zheng, G., Srikumar, V.: DeepLog: anomaly detection and diagnosis from system logs through deep learning. In: Proceedings of ACM Asia Conference on Computer and Communications Security (AsiaCCS), pp. 1285–1298 (2017)

    Google Scholar 

  5. LeCun, Y., Bengio, Y., Hinton, G.: Deep learning. Nature 521, 436–444 (2015)

    Article  Google Scholar 

  6. Lin, T.-Y., Goyal, P., Girshick, R., He, K., Dollar, P.: Focal loss for dense object detection. IEEE Trans. Pattern Anal. Mach. Intell. (TPAMI) 42(2), 318–327 (2020)

    Article  Google Scholar 

  7. Yang, L., et al.: Semi-supervised log-based anomaly detection via probabilistic label estimation. In: Proceedings of IEEE/ACM 43rd International Conference on Software Engineering (ICSE), pp. 1448–1460 (2021)

    Google Scholar 

  8. Cho, K., van Merriënboer, B., Bahdanau, D., Bengio, Y.: On the properties of neural machine translation: encoder–decoder approaches. In: Proceedings of Eighth Workshop on Syntax, Semantics and Structure in Statistical Translation (SSST), pp. 103–111 (2014)

    Google Scholar 

  9. Mei, Y.D., Chen, X., Sun, Y.Z.: A software system anomaly detection method based on log information and CNN-text. Chin. J. Comput. 43, 366–380 (2020)

    Google Scholar 

  10. Lu, S., Wei, X., Li, Y., Wang, L.: Detecting anomaly in big data system logs using convolutional neural network. In: Proceedings of Dependable Autonomic and Secure Computing (DASC), pp. 151–158 (2018)

    Google Scholar 

  11. Zhang, C., et al.: DeepTraLog: trace-log combined microservice anomaly detection through graph-based deep learning. In: Proceedings of the 44th International Conference on Software Engineering (ICSE), pp. 623–634 (2022)

    Google Scholar 

  12. Lei, T., Zhang, Y., Wang, S., Dai, H., Artzi, Y.: Simple recurrent units for highly parallelizable recurrence. In: Proceedings of Conference on Empirical Methods in Natural Language Processing (EMNLP), pp. 4470–4481 (2018)

    Google Scholar 

  13. Zhu, J., He, S., He, P., Liu, J., Lyu, M. R.: Loghub: a large collection of system log datasets for AI-driven log analytics. In: Proceedings of IEEE 34th International Symposium on Software Reliability Engineering (ISSRE), pp. 355–366 (2023)

    Google Scholar 

  14. Xu, W., Huang, L., Fox, A., Patterson, D., Jordan, M. I.: Detecting large-scale system problems by mining console logs. In: Proceedings of International Conference on Machine Learning (ICML), pp. 117–131 (2009)

    Google Scholar 

  15. Oliner, A. J., Stearley, J.: What supercomputers say: a study of five system logs. In: Proceedings of Edinburgh, pp. 575–584 (2007)

    Google Scholar 

  16. Le, V.-H., Zhang, H.: Log-based anomaly detection with deep learning: how far are we? In: Proceedings of the 44th International Conference on Software Engineering (ICSE), pp. 1356–1367 (2022)

    Google Scholar 

  17. Wang, Z., Tian, J., Fang, H., Chen, L., Qin, J.: LightLog: a lightweight temporal convolutional network for log anomaly detection on the edge. Comput. Netw. (CN) 203, 108616 (2022)

    Google Scholar 

  18. Jia, T., Li, Y., Yang, Y., Huang, G., Wu, Z.: Augmenting log-based anomaly detection models to reduce false anomalies with human feedback. In: Proceedings of ACM SIGKDD Conference on Knowledge Discovery and Data Mining (SIGKDD), pp. 3081–3089 (2022)

    Google Scholar 

  19. Vaswani, A., et al.: Attention is all you need. In: Proceedings of Advances in Neural Information Processing Systems (NeurIPS), pp. 5998–6008 (2017)

    Google Scholar 

  20. Studiawan, H., Sohel, F., Payne, C.: Anomaly detection in operating system logs with deep learning-based sentiment analysis. IEEE Trans. Dependable Secure Comput. (TDSC) 18(5), 2136–2148 (2021)

    Article  Google Scholar 

  21. Xie, Y., Zhang, H., Babar, M. A.: LogGD: detecting anomalies from system logs with graph neural networks. In: Proceedings of IEEE 22nd International Conference on Software Quality, Reliability and Security (QRS), pp. 299–310 (2022)

    Google Scholar 

  22. Ou, X., Liu, J.: LogKT: hybrid log anomaly detection method for cloud data center. In: Proceedings of International Computer Software and Applications Conference (COMPSAC), pp. 164–173 (2023)

    Google Scholar 

Download references

Acknowledgments

This work was supported in part by the Natural Science Foundation of Inner Mongolia of China (No.2023ZD18), the Natural Science Foundation of China (No.62462047), the Engineering Research Center of Ecological Big Data, Ministry of Education, the fund of Supporting the Reform and Development of Local Universities (Disciplinary Construction) and the special research project of First-class Discipline of Inner Mongolia A. R. of China under Grant YLXKZX-ND-036.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jing Liu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2025 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Liang, F., Liu, J. (2025). EDSLog: Efficient Log Anomaly Detection Method Based on Dataset Partitioning. In: Bourke, T., Chen, L., Goharshady, A. (eds) Dependable Software Engineering. Theories, Tools, and Applications. SETTA 2024. Lecture Notes in Computer Science, vol 15469. Springer, Singapore. https://doi.org/10.1007/978-981-96-0602-3_22

Download citation

  • DOI: https://doi.org/10.1007/978-981-96-0602-3_22

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-96-0601-6

  • Online ISBN: 978-981-96-0602-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics