Reference Hub3
Anomaly Detection Using System Logs: A Deep Learning Approach

Anomaly Detection Using System Logs: A Deep Learning Approach

Rohit Sinha, Rittika Sur, Ruchi Sharma, Avinash K. Shrivastava
Copyright: © 2022 |Volume: 16 |Issue: 1 |Pages: 15
ISSN: 1930-1650|EISSN: 1930-1669|EISBN13: 9781683180203|DOI: 10.4018/IJISP.285584
Cite Article Cite Article

MLA

Sinha, Rohit, et al. "Anomaly Detection Using System Logs: A Deep Learning Approach." IJISP vol.16, no.1 2022: pp.1-15. http://doi.org/10.4018/IJISP.285584

APA

Sinha, R., Sur, R., Sharma, R., & Shrivastava, A. K. (2022). Anomaly Detection Using System Logs: A Deep Learning Approach. International Journal of Information Security and Privacy (IJISP), 16(1), 1-15. http://doi.org/10.4018/IJISP.285584

Chicago

Sinha, Rohit, et al. "Anomaly Detection Using System Logs: A Deep Learning Approach," International Journal of Information Security and Privacy (IJISP) 16, no.1: 1-15. http://doi.org/10.4018/IJISP.285584

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Anomaly detection is a very important step in building a secure and trustworthy system. Manually it is daunting to analyze and detect failures and anomalies. In this paper, we proposed an approach that leverages the pattern matching capabilities of Convolution Neural Network (CNN) for anomaly detection in system logs. Features from log files are extracted using a windowing technique. Based on this feature, a one-dimensional image (1×n dimension) is generated where the pixel values of an image correlate with the features of the logs. On these images, the 1D Convolution operation is applied followed by max pooling. Followed by Convolution layers, a multi-layer feed-forward neural network is used as a classifier that learns to classify the logs as normal or abnormal from the representation created by the convolution layers. The model learns the variation in log pattern for normal and abnormal behavior. The proposed approach achieved improved accuracy compared to existing approaches for anomaly detection in Hadoop Distributed File System (HDFS) logs.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.