skip to main content
10.1145/3502223.3502250acmotherconferencesArticle/Chapter ViewAbstractPublication PagesijckgConference Proceedingsconference-collections
research-article

LEKG: A System for Constructing Knowledge Graphs from Log Extraction

Authors Info & Claims
Published:24 January 2022Publication History

ABSTRACT

Logs record system events and status, which help developers and system administrators diagnose run time errors, monitor running status and mine operation patterns [13, 23]. However, logs are complex and weakly linked, making it difficult to diagnose the causes of failures. While recent studies on log knowledge extraction focus on lifting entities from log messages for enriching a background knowledge graph (BKG), they do not involve knowledge reasoning for inferring implicit relations nor guarantee that the knowledge learned from log streams is consistent with the background knowledge. In this preliminary research paper, we present a log extraction approach to log knowledge graph (KG) construction. It includes a novel strategy that utilizes inference rules from a background knowledge graph to learn new triples and validate triples. Also, it implements a local to global strategy to perform reasoning on temporary log instance graphs (LIGs) then on the extended BKG, which significantly reduces query space. Finally we demonstrate the applicability of this approach by a use case in the context of root cause analysis.

References

  1. Naser Ahmadi, Viet Phi Huynh, Vamsi Meduri, Stefano Ortona, and Paolo Papotti. 2020. Mining Expressive Rules in Knowledge Graphs. Journal of Data and Information Quality 12, 2 (2020). https://doi.org/10.1145/3371315Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Álvaro Brandón, Marc Solé, Alberto Huélamo, David Solans, María S. Pérez, and Victor Muntés-Mulero. 2020. Graph-based root cause analysis for service-oriented and microservice architectures. Journal of Systems and Software 159 (2020). https://doi.org/10.1016/j.jss.2019.110432Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Harith A. Dawood. 2014. Graph theory and cyber security. Proceedings - 3rd International Conference on Advanced Computer Science Applications and Technologies, ACSAT 2014(2014), 90–96. https://doi.org/10.1109/ACSAT.2014.23Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Youcef Djenouri, Asma Belhadi, and Philippe Fournier-Viger. 2018. Extracting useful knowledge from event logs: A frequent itemset mining approach. Knowledge-Based Systems 139 (2018), 132–148. https://doi.org/10.1016/j.knosys.2017.10.016Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Hristo Djidjev, Gary Sandine, Curtis B. Storlie, and Scott Vander Wiel. 2011. Graph Based Statistical Analysis of Network Traffic. Mlg ’11 (2011), 8. https://www.cs.purdue.edu/mlg2011/papers/paper_10.pdfGoogle ScholarGoogle Scholar
  6. Min Du, Feifei Li, Guineng Zheng, and Vivek Srikumar. 2017. DeepLog: Anomaly detection and diagnosis from system logs through deep learning. Proceedings of the ACM Conference on Computer and Communications Security (2017), 1285–1298. https://doi.org/10.1145/3133956.3134015Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Andreas Ekelhart, Fajar J. Ekaputra, and Elmar Kiesling. 2021. The SLOGERT Framework for Automated Log Knowledge Graph Construction. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 12731 LNCS (2021), 631–646. https://doi.org/10.1007/978-3-030-77385-4_38Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Andreas Ekelhart, Elmar Kiesling, and Kabul Kurniawan. 2018. Taming the logs – Vocabularies for semantic security analysis. Procedia Computer Science 137 (2018), 109–119. https://doi.org/10.1016/j.procs.2018.09.011Google ScholarGoogle ScholarCross RefCross Ref
  9. Alexandre P. Francisco, Ricardo Baeza-Yates, and Arlindo L. Oliveira. 2012. Mining query log graphs towards a query folksonomy. Concurrency and Computation: Practice and Experience 24, 17(2012), 2179–2192. https://doi.org/10.1002/cpe.1773Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Luis Galárraga, Christina Teflioudi, Katja Hose, and Fabian M. Suchanek. 2015. Fast rule mining in ontological knowledge bases with AMIE+. VLDB Journal 24, 6 (2015), 707–730. https://doi.org/10.1007/s00778-015-0394-1Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Luis Antonio Galárraga, Christina Teflioudi, Katja Hose, and Fabian Suchanek. 2013. AMIE: Association Rule Mining under Incomplete Evidence in Ontological Knowledge Bases. (2013), 413–422. https://doi.org/10.1145/2488388.2488425Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Víctor Gutiérrez-Basulto, Jean Christoph Jung, Carsten Lutz, and Lutz Schröder. 2017. Probabilistic description logics for subjective uncertainty. Journal of Artificial Intelligence Research 58(1) (2017), 1–66.Google ScholarGoogle Scholar
  13. Pinjia He, Jieming Zhu, Shilin He, Jian Li, and Michael R. Lyu. 2016. An evaluation study on log parsing and its use in log mining. Proceedings - 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2016(2016), 654–661. https://doi.org/10.1109/DSN.2016.66Google ScholarGoogle ScholarCross RefCross Ref
  14. Aidan Hogan. 2020. Shape Constraints and Expressions. In The Web of Data. Springer, 449–513.Google ScholarGoogle Scholar
  15. Elmar Kiesling, Andreas Ekelhart, Kabul Kurniawan, and Fajar Ekaputra. 2019. The SEPSES Knowledge Graph: An Integrated Resource for Cybersecurity. Vol. 11779 LNCS. Springer International Publishing. 198–214 pages. https://doi.org/10.1007/978-3-030-30796-7_13Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Jonathan Lajus, Luis Galárraga, and Fabian Suchanek. 2020. Fast and Exact Rule Mining with AMIE 3. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 12123 LNCS (2020), 36–52. https://doi.org/10.1007/978-3-030-49461-2_3Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Xue Li, Alan Bundy, and Eugene Philalithis. 2021. Signature Entrenchment and Conceptual Changes in Automated Theory Repair. In The Ninth Annual Conference on Advances in Cognitive Systems. Cognitive Systems Foundation.Google ScholarGoogle Scholar
  18. Xue Li, Alan Bundy, and Alan Smaill. 2018. ABC repair system for datalog-like theories. IC3K 2018 - Proceedings of the 10th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management 2 (2018), 335–342. https://doi.org/10.5220/0006959703350342Google ScholarGoogle Scholar
  19. Jian Guang Lou, Qiang Fu, Yi Wang, and Jiang Li. 2010. Mining dependency in distributed systems through unstructured logs analysis. Operating Systems Review (ACM) 44, 1 (2010), 91–96. https://doi.org/10.1145/1740390.1740411Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Ravi Lourdusamy and Stanislaus Abraham. 2020. A Survey on Methods of Ontology Learning from Text. May (2020), 113–123. https://doi.org/10.1007/978-3-030-38501-9_11Google ScholarGoogle Scholar
  21. Thomas Lukasiewicz. 2008. Expressive probabilistic description logics. Artificial Intelligence 172(6-7) (2008), 852–883.Google ScholarGoogle Scholar
  22. Weibin Meng, Ying Liu, Yichen Zhu, Shenglin Zhang, Dan Pei, Yuqing Liu, Yihao Chen, Ruizhi Zhang, Shimin Tao, Pei Sun, and Rong Zhou. 2019. Loganomaly: Unsupervised detection of sequential and quantitative anomalies in unstructured logs. IJCAI International Joint Conference on Artificial Intelligence 2019-Augus(2019), 4739–4745. https://doi.org/10.24963/ijcai.2019/658Google ScholarGoogle ScholarCross RefCross Ref
  23. Adam Oliner, Archana Ganapathi, and Wei Xu. 2012. Advances and challenges in log analysis. Commun. ACM 55, 2 (feb 2012), 55–61. https://doi.org/10.1145/2076450.2076466Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Stefano Ortona, Venkata Vamsikrishna Meduri, and Paolo Papotti. 2018. Robust discovery of positive and negative rules in knowledge bases. Proceedings - IEEE 34th International Conference on Data Engineering, ICDE 2018 (2018), 1180–1191. https://doi.org/10.1109/ICDE.2018.00108Google ScholarGoogle ScholarCross RefCross Ref
  25. J.Z. Pan, D. Calvanese, T. Eiter, I. Horrocks, M. Kifer, F. Lin, and Y. Zhao. 2017. Reasoning Web: Logical Foundation of Knowledge Graph Construction and Querying Answering. Springer.Google ScholarGoogle ScholarCross RefCross Ref
  26. J.Z. Pan, G. Vetere, J.M. Gomez-Perez, and H. Wu. 2016. Exploiting Linked Data and Knowledge Graphs for Large Organisations. Springer.Google ScholarGoogle Scholar
  27. Jeff Z. Pan and Ian Horrocks. 2002. Reasoning in the SHOQ(Dn) Description Logic. In Proceedings of the 2002 International Workshop on Description Logics (DL2002), Ian Horrocks and Sergio Tessaris (Eds.).Google ScholarGoogle Scholar
  28. Jeff Z. Pan and Ian Horrocks. 2003. Web Ontology Reasoning with Datatype Groups. In Proc. of the International Semantic Web Conference. 47–63.Google ScholarGoogle Scholar
  29. Jeff Z. Pan, Giorgos B. Stamou, Vassilis Tzouvaras, and Ian Horrocks. 2005. f-SWRL: A Fuzzy Extension of SWRL. In Artificial Neural Networks: Formal Models and Their Applications - ICANN. 829–834.Google ScholarGoogle Scholar
  30. Jeff Z. Pan, Giorgos Stoilos, Giorgos Stamou, Vassilis Tzouvaras, and Ian Horrocks. 2006. f-SWRL: A Fuzzy Extension of SWRL. Journal of Data Semantic(2006), 28–46.Google ScholarGoogle Scholar
  31. Antonio Pecchia, Ingo Weber, Marcello Cinque, and Yu Ma. 2020. Discovering process models for the analysis of application failures under uncertainty of event logs. Knowledge-Based Systems 189 (2020). https://doi.org/10.1016/j.knosys.2019.105054Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Kexin Pei, Zhongshu Gu, Brendan Saltaformaggio, Shiqing Ma, Fei Wang, Zhiwei Zhang, Luo Si, Xiangyu Zhang, and Dongyan Xu. 2016. HERCULE: Attack story reconstruction via community discovery on correlated log graph. ACM International Conference Proceeding Series 5-9-Decemb, 3(2016), 583–595. https://doi.org/10.1145/2991079.2991122Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Aditya Pingle, Aritran Piplai, Sudip Mittal, Anupam Joshi, James Holt, and Richard Zak. 2019. Relext: Relation extraction using deep learning approaches for cybersecurity knowledge graph improvement. Proceedings of the 2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2019 (2019), 879–886. https://doi.org/10.1145/3341161.3343519 arxiv:1905.02497Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Guilin Qi, Qiu Ji, Jeff Z. Pan, and Jianfeng Du. 2011. Extending Description Logics with Uncertainty Reasoning in Possibilistic Logic. International Journal of Intelligent Systems 26(4) (2011).Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Guilin Qi, Jeff Z. Pan, and Qiu Ji. 2007. A Possibilistic Extension of Description Logics. In Proc. of 2007 International Workshop on Description Logics (DL2007).Google ScholarGoogle Scholar
  36. Wilhelm Schickard-lnstitute, Ulrich Gntzer, Wilhelm Schickard-lnstitute, Daimlerchrysler Ag, and F T Ad. [n. d.]. Algorithms for Association Rule Mining - A General Survey and Comparison. 2, 1 ([n. d.]), 58–64.Google ScholarGoogle Scholar
  37. Murat Sensoy, Achille Fokoue, Jeff Z. Pan, Timothy J. Norman, Yuqing Tang, Nir Oren, and Katia P. Sycara. 2013. Reasoning about uncertain information and conflict resolution through trust revision. In Proc. of the International conference on Autonomous Agents and Multi-Agent Systems, AAMAS, Maria L. Gini, Onn Shehory, Takayuki Ito, and Catholijn M. Jonker (Eds.). 837–844.Google ScholarGoogle Scholar
  38. Evren Sirin, Bijan Parsia, Bernardo Cuenca Grau, Aditya Kalyanpur, and Yarden Katz. 2007. Pellet: A practical OWL-DL reasoner. Web Semantics 5, 2 (2007), 51–53. https://doi.org/10.1016/j.websem.2007.03.004Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Giorgos Stoilos, Giorgos B. Stamou, and Jeff Z. Pan. 2006. Handling Imprecise Knowledge with Fuzzy Description Logic. In the Proc. of the 2006 International Workshop on Description Logics (DL2006).Google ScholarGoogle Scholar
  40. Hudan Studiawan, Christian Payne, and Ferdous Sohel. 2017. Graph clustering and anomaly detection of access control log for forensic purposes. Digital Investigation 21(2017), 76–87. https://doi.org/10.1016/j.diin.2017.05.001Google ScholarGoogle ScholarCross RefCross Ref
  41. Jan Svacina, Jackson Raffety, Connor Woodahl, Brooklynn Stone, Tomas Cerny, Miroslav Bures, Dongwan Shin, Karel Frajtak, and Pavel Tisnovsky. 2020. On Vulnerability and Security Log analysis: A Systematic Literature Review on Recent Trends. ACM International Conference Proceeding Series (2020), 175–180. https://doi.org/10.1145/3400286.3418261Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Ding Yuan, Haohui Mai, Weiwei Xiong, Lin Tan, Yuanyuan Zhou, and Shankar Pasupathy. 2010. SherLog: Error diagnosis by connecting clues from run-time logs. International Conference on Architectural Support for Programming Languages and Operating Systems - ASPLOS(2010), 143–154. https://doi.org/10.1145/1736020.1736038Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Jieming Zhu, Shilin He, Jinyang Liu, Pinjia He, Qi Xie, Zibin Zheng, and Michael R. Lyu. 2019. Tools and Benchmarks for Automated Log Parsing. Proceedings - 2019 IEEE/ACM 41st International Conference on Software Engineering: Software Engineering in Practice, ICSE-SEIP 2019 (2019), 121–130. https://doi.org/10.1109/ICSE-SEIP.2019.00021 arxiv:1811.03509Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. De Qing Zou, Hao Qin, and Hai Jin. 2016. UiLog: Improving Log-Based Fault Diagnosis by Log Analysis. Journal of Computer Science and Technology 31, 5 (2016), 1038–1052. https://doi.org/10.1007/s11390-016-1678-7Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. LEKG: A System for Constructing Knowledge Graphs from Log Extraction
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          IJCKG '21: Proceedings of the 10th International Joint Conference on Knowledge Graphs
          December 2021
          204 pages

          Copyright © 2021 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 24 January 2022

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed limited

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format .

        View HTML Format