29

System Event Log - School of Computingmind/papers/deepLog_short.pdf · 2017-12-04 · 29 DeepLog A realtime system log anomaly detection framework. LSTM is used to model system execution

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: System Event Log - School of Computingmind/papers/deepLog_short.pdf · 2017-12-04 · 29 DeepLog A realtime system log anomaly detection framework. LSTM is used to model system execution
Page 2: System Event Log - School of Computingmind/papers/deepLog_short.pdf · 2017-12-04 · 29 DeepLog A realtime system log anomaly detection framework. LSTM is used to model system execution

2

Page 3: System Event Log - School of Computingmind/papers/deepLog_short.pdf · 2017-12-04 · 29 DeepLog A realtime system log anomaly detection framework. LSTM is used to model system execution

3

System Event LogExist practically on

every computer system!

Automatic Analysis?

Page 4: System Event Log - School of Computingmind/papers/deepLog_short.pdf · 2017-12-04 · 29 DeepLog A realtime system log anomaly detection framework. LSTM is used to model system execution

4

SystemEventLog

Started service A on port 80Executor updated: app-1 is now LOADING……

Page 5: System Event Log - School of Computingmind/papers/deepLog_short.pdf · 2017-12-04 · 29 DeepLog A realtime system log anomaly detection framework. LSTM is used to model system execution

5

SystemEventLog

Structured Data

Log key

printf(“Started service %s on port %d”, x, y);

LOG PARSING

Started service A on port 80Executor updated: app-1 is now LOADING……

Started service * on port *Executor updated: * is now LOADING……

Page 6: System Event Log - School of Computingmind/papers/deepLog_short.pdf · 2017-12-04 · 29 DeepLog A realtime system log anomaly detection framework. LSTM is used to model system execution

6

SystemEventLog

Structured Data Anomaly Detection

LOG ANALYSIS

LOG PARSING

Started service A on port 80Executor updated: app-1 is now LOADING……

Started service * on port *Executor updated: * is now LOADING……

Log key

printf(“Started service %s on port %d”, x, y);

Page 7: System Event Log - School of Computingmind/papers/deepLog_short.pdf · 2017-12-04 · 29 DeepLog A realtime system log anomaly detection framework. LSTM is used to model system execution

7

Page 8: System Event Log - School of Computingmind/papers/deepLog_short.pdf · 2017-12-04 · 29 DeepLog A realtime system log anomaly detection framework. LSTM is used to model system execution

8

SPELLA streaming log

parser published in ICDM’16

Deletion of file1 complete. Deletion of file1 complete.

log keylog message

Deletion of file2 complete. Deletion of * complete.

parameters

[ ]

[file2]

Page 9: System Event Log - School of Computingmind/papers/deepLog_short.pdf · 2017-12-04 · 29 DeepLog A realtime system log anomaly detection framework. LSTM is used to model system execution

9

DeepLog

Anomaly Detection Diagnosis

Page 10: System Event Log - School of Computingmind/papers/deepLog_short.pdf · 2017-12-04 · 29 DeepLog A realtime system log anomaly detection framework. LSTM is used to model system execution

10

TrainingStage

DetectionStage

MODELS

Page 11: System Event Log - School of Computingmind/papers/deepLog_short.pdf · 2017-12-04 · 29 DeepLog A realtime system log anomaly detection framework. LSTM is used to model system execution

11

DetectionStage

MODELS

Page 12: System Event Log - School of Computingmind/papers/deepLog_short.pdf · 2017-12-04 · 29 DeepLog A realtime system log anomaly detection framework. LSTM is used to model system execution

12

DetectionStage

MODELS

Page 13: System Event Log - School of Computingmind/papers/deepLog_short.pdf · 2017-12-04 · 29 DeepLog A realtime system log anomaly detection framework. LSTM is used to model system execution

13

DetectionStage

MODELS

Page 14: System Event Log - School of Computingmind/papers/deepLog_short.pdf · 2017-12-04 · 29 DeepLog A realtime system log anomaly detection framework. LSTM is used to model system execution

14

DetectionStage

MODELS

Page 15: System Event Log - School of Computingmind/papers/deepLog_short.pdf · 2017-12-04 · 29 DeepLog A realtime system log anomaly detection framework. LSTM is used to model system execution

15

TrainingStage

MODELS

Page 16: System Event Log - School of Computingmind/papers/deepLog_short.pdf · 2017-12-04 · 29 DeepLog A realtime system log anomaly detection framework. LSTM is used to model system execution

16

TrainingStage

MODELS

Page 17: System Event Log - School of Computingmind/papers/deepLog_short.pdf · 2017-12-04 · 29 DeepLog A realtime system log anomaly detection framework. LSTM is used to model system execution

17

TrainingStage

MODELS

Page 18: System Event Log - School of Computingmind/papers/deepLog_short.pdf · 2017-12-04 · 29 DeepLog A realtime system log anomaly detection framework. LSTM is used to model system execution

18

TrainingStage

MODELS

Page 19: System Event Log - School of Computingmind/papers/deepLog_short.pdf · 2017-12-04 · 29 DeepLog A realtime system log anomaly detection framework. LSTM is used to model system execution

19

TrainingStage

MODELS

Page 20: System Event Log - School of Computingmind/papers/deepLog_short.pdf · 2017-12-04 · 29 DeepLog A realtime system log anomaly detection framework. LSTM is used to model system execution

20

TrainingStage

MODELS

Page 21: System Event Log - School of Computingmind/papers/deepLog_short.pdf · 2017-12-04 · 29 DeepLog A realtime system log anomaly detection framework. LSTM is used to model system execution

21

Use long short-term memory (LSTM) architecture

In detection stage, DeepLog checks if the actual next log key is among its top g probable predictions.

Page 22: System Event Log - School of Computingmind/papers/deepLog_short.pdf · 2017-12-04 · 29 DeepLog A realtime system log anomaly detection framework. LSTM is used to model system execution

22

Method 1: Using LSTM prediction probabilities

Method 2: Using co-occurrence matrix

Page 23: System Event Log - School of Computingmind/papers/deepLog_short.pdf · 2017-12-04 · 29 DeepLog A realtime system log anomaly detection framework. LSTM is used to model system execution

23

Page 24: System Event Log - School of Computingmind/papers/deepLog_short.pdf · 2017-12-04 · 29 DeepLog A realtime system log anomaly detection framework. LSTM is used to model system execution

24

Multi-variate time series data anomaly detection problem!--- Leverage LSTM to check reconstruction error.

Page 25: System Event Log - School of Computingmind/papers/deepLog_short.pdf · 2017-12-04 · 29 DeepLog A realtime system log anomaly detection framework. LSTM is used to model system execution

25

Evaluation results on HDFS log data. (over a million log entries with labeled anomalies)

PCA (SOSP’09), IM (UsenixATC’10), N-gram (baseline language model)

Page 26: System Event Log - School of Computingmind/papers/deepLog_short.pdf · 2017-12-04 · 29 DeepLog A realtime system log anomaly detection framework. LSTM is used to model system execution

26

Evaluation results on Blue Gene/L log, with and without online model update.

Page 27: System Event Log - School of Computingmind/papers/deepLog_short.pdf · 2017-12-04 · 29 DeepLog A realtime system log anomaly detection framework. LSTM is used to model system execution

27

Evaluation results on OpenStack cloud log with different confidence intervals (CIs)

Page 28: System Event Log - School of Computingmind/papers/deepLog_short.pdf · 2017-12-04 · 29 DeepLog A realtime system log anomaly detection framework. LSTM is used to model system execution

28

Diagnosis using constructed workflow.

Injected anomaly: during VM creation, network speed from controller to compute node is throttled.

Page 29: System Event Log - School of Computingmind/papers/deepLog_short.pdf · 2017-12-04 · 29 DeepLog A realtime system log anomaly detection framework. LSTM is used to model system execution

29

DeepLog

➢ A realtime system log anomaly detection framework.

➢ LSTM is used to model system execution paths and log parameter values.

➢ Workflow models are built to help anomaly diagnosis.

➢ It supports online model update.

Min [email protected]