Logs have been an imperative resource to ensure the reliability and continuity of many software systems, especially large-scale distributed systems. They faithfully record runtime information to facilitate system troubleshooting and behavior understanding. Due to the large scale and complexity of modern software systems, the volume of logs has reached an unprecedented level. Consequently, for log-based anomaly detection, conventional methods of manual inspection or even traditional machine learning-based methods become impractical, which serve as a catalyst for the rapid development of deep learning-based solutions. However, there is currently a lack of rigorous comparison among the representative log-based anomaly detectors which resort to neural network models. Moreover, the re-implementation process demands non-trivial efforts and bias can be easily introduced. To better understand the characteristics of different anomaly detectors, in this paper, we provide a comprehensive review and evaluation on five popular models used by six state-of-the-art methods. Particularly, four of the selected methods are unsupervised and the remaining two are supervised. These methods are evaluated with two publicly-available log datasets, which contain nearly 16 millions log messages and 0.4 million anomaly instances in total. We believe our work can serve as a basis in this field and contribute to the future academic researches and industrial applications.
翻译:日志是确保许多软件系统的可靠性和连续性,特别是大规模分布式系统的系统;它们忠实记录运行时间信息,以便利系统排除故障和理解行为;由于现代软件系统的规模和复杂性很大,日志的数量达到了前所未有的水平;因此,对基于日志的异常检测,传统的手工检查方法,甚至传统的机械学习方法,成为不切实际的,这是迅速开发深层次学习解决方案的催化剂;然而,目前缺乏对使用神经网络模型的基于日志的异常探测器的严格比较;此外,再实施程序要求非三角努力和偏见,而且很容易引入;为了更好地了解不同异常探测器的特征,我们在本文件中对六种最新方法使用的五种流行模型进行了全面审查和评价。特别是,所选方法中的四种不统一,其余两种得到监督。这些方法用两种公开的日志数据集加以评价,其中含有近1 600万条日志信息,总共包含40万个异常案例。我们认为,我们的工作可以作为实地研究的基础,为未来工业应用作出贡献。