[1] GAO Yun,ZHOU Wei,HAN Jizhong,et al.An online log anomaly detection method based on grammar compression[J].Chinese Journal of Computers,2014,37(1):73-86.(in Chinese)高赟,周薇,韩冀中,等.一种基于文法压缩的日志异常检测算法[J].计算机学报,2014,37(1):73-86. [2] JIA Tong,YANG Lin,CHEN Pengfei,et al.LogSed:anomaly diagnosis through mining time-weighted control flow graph in logs[C]//Proceedings of the 10th IEEE International Conference on Cloud Computing.Washington D.C.,USA:IEEE Press,2017:447-455. [3] SCHINDLER T.Anomaly detection in log data using graph databases and machine learning to defend advanced persistent threats[EB/OL].[2019-06-20].http://arxiv.org/pdf/1802.00259. [4] BROWN A,TUR A,HUTCHINSON B,et al.Recurrent neural network attention mechanisms for interpretable system log anomaly detection[C]//Proceedings of the 1st Workshop on Machine Learning for Computing Systems.New York,USA:ACM Press,2018:1-8. [5] LECUN Y,BENGIO Y,HINTON G.Deep learning[J].Nature,2015,521(7553):436-444. [6] FU Yu,LI Hongcheng,WU Xiaoping,et al.Detecting APT attacks:a survey from the perspective of big data analysis[J].Journal on Communications,2015,36(11):1-14.(in Chinese)付钰,李洪成,吴晓平,等.基于大数据分析的APT攻击检测研究综述[J].通信学报,2015,36(11):1-14. [7] JIANG W,HU C,PASUPATHY S,et al.Understanding customer problem troubleshooting from storage system logs[C]//Proceedings of IEEE Conference on File and Storage Technologies.Washington D.C.,USA:IEEE Press,2009:43-56 [8] OLINER A,STEARLEY J.What supercomputers say:a study of five system logs[C]//Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks.Washington D.C.,USA:IEEE Press,2007:575-584. [9] LIU Zhaoli,QIN Tao,GUAN Xiaohong,et al.An integrated method for anomaly detection from massive system logs[J].IEEE Access,2018,6:30602-30611. [10] BAO Liang,LI Qian,LU Peiyao,et al.Execution anomaly detection in large-scale systems through console log analysis[J].Journal of Systems and Software,2018,143:172-186. [11] ZHANG K,XU J,MIN M R,et al.Automated IT system failure prediction:a deep learning approach[C]//Proceedings of IEEE International Conference on Big Data.Washington D.C.,USA:IEEE Press,2016:1291-1300. [12] DU Min,LI Feifei,ZHENG Guineng,et al.Deeplog:anomaly detection and diagnosis from system logs through deep learning[C]//Proceedings of 2017 ACM SIGSAC Conference on Computer and Communications Security.New York,USA:ACM Press,2017:1285-1298. [13] BAI S,KOLTER J Z,KOLTUN V.An empirical evaluation of generic convolutional and recurrent networks for sequence modeling[EB/OL].[2019-06-20].https://arxiv.org/abs/1803.01271v1. [14] OORD A,DIELEMAN S,ZEN H,et al.Wavenet:a generative model for raw audio[EB/OL].[2019-06-20].https://arxiv.org/abs/1609.03499v1. [15] YU F,KOLTUN V.Multi-scale context aggregation by dilated convolutions[EB/OL].[2019-06-20].https://arxiv.org/abs/1511.071222015. [16] HE Kaiming,ZHANG Xiangyu,REN Shaoqing,et al.Deep residual learning for image recognition[C]//Proceedings of IEEE Conference on Computer Vision and Pattern Recognition.Washington D.C.,USA:IEEE Press,2016:770-778. [17] YANG Ruipeng,QU Dan,QIAN Yekui,et al.An online log template extraction method based on hierarchical clustering[J].EURASIP Journal on Wireless Communica-tions and Networking,2019(1):135-146. [18] NAIR V,HINTON G E.Rectified linear units improve restricted boltzmann machines[C]//Proceedings of the 27th IEEE International Conference on Machine Learning.Washington D.C.,USA:IEEE Press,2010:807-814. [19] HE Kaiming,ZHANG Xiangyu,REN Shaoqing.Delving deep into rectifiers:surpassing human-level performance on image net classification[C]//Proceedings of IEEE International Conference on Computer Vision.Washington D.C.,USA:IEEE Press,2015:1026-1034. [20] MAAS A L,HANNUN A Y,NG A Y.Rectifier nonlinearities improve neural network acoustic models[J].Machine Learning,2013,30(1):3-8. [21] LIN Min,CHEN Qiang,YAN Shuicheng.Network in network[EB/OL].[2019-06-20].https://arxiv.org/abs/1312.4400. [22] OLINER A,STEAREY J.What supercomputers say:a study of five system logs[C]//Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks.Washington D.C.,USA:IEEE Press,2007:575-584. [23] VASWANI A,SHAZEER N,PARMAR N,et al.Attention is all you need[EB/OL].[2019-06-20].https://researchgate.net/publication/. |