Next Article in Journal
Load Effect Analysis Method of Cable-Stayed Bridge for Long-Span Track Based on Adaptive Filtering Method
Previous Article in Journal
Study on Multi-Span Tension Coupling Relationship of Gravure Printed Electronic Equipment
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

LogEDL: Log Anomaly Detection via Evidential Deep Learning

by
Yunfeng Duan
1,†,
Kaiwen Xue
2,†,
Hao Sun
1,
Haotong Bao
2,
Yadong Wei
2,
Zhangzheng You
2,
Yuantian Zhang
2,
Xiwei Jiang
2,
Sangning Yang
2,
Jiaxing Chen
1,
Boya Duan
1 and
Zhonghong Ou
2,*
1
China Mobile Communications Group Co., Ltd., Beijing 102206, China
2
State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Appl. Sci. 2024, 14(16), 7055; https://doi.org/10.3390/app14167055
Submission received: 24 June 2024 / Revised: 22 July 2024 / Accepted: 5 August 2024 / Published: 12 August 2024

Abstract

:
With advancements in digital technologies such as 5G communications, big data, and cloud computing, the components of network operation systems have become increasingly complex, significantly complicating system monitoring and maintenance. Correspondingly, automated log anomaly detection has become a crucial means to ensure stable network operation and protect networks from malicious attacks or failures. Conventional machine learning and deep learning methods assume consistent distributions between the training and testing data, adhering to a closed-set recognition paradigm. Nevertheless, in realistic scenarios, systems may encounter new anomalies that were not present in the training data, especially in log anomaly detection. Inspired by evidential learning, we propose a novel anomaly detector called LogEDL, which supervises the training of the model through an evidential loss function. Unlike traditional loss functions, the evidential loss function not only focuses on correct classification but also quantifies the uncertainty of predictions. This enhances the robustness and accuracy of the model in handling anomaly detection tasks while achieving functionality similar to open-set recognition. To evaluate the proposed LogEDL method, we conduct extensive experiments on three datasets, i.e., HDFS, BGL, and Thunderbird, to detect anomalous log sequences. The experimental results demonstrate that our proposed LogEDL achieves state-of-the-art performance in anomaly detection.

1. Introduction

Ensuring the stable operation of large modern systems is critical to business continuity, and a log of runtime status and events reflects the reliability of the system. Logs [1,2,3], as semi-structured text, typically consist of fixed templates and dynamic parameters that carry rich semantic information. In the event of a system failure, the most straightforward approach for maintenance personnel is to perform a log analysis. However, manually identifying anomalies based on massive log data has become impractical [4,5]. Due to the rapid growth in log size, log analysis by experienced experts has become increasingly challenging [6]. As a result, automatic detection of system anomalies from logs has become critical. To address this problem, automated log analysis approaches are proposed that aim to automatically analyze logs using machine learning (ML) or deep learning (DL) techniques. In the field of log anomaly detection, traditional approaches for processing log sequences include word embedding methods and RNN-based feature embedding methods [7]. However, these methods have difficulty in modeling long-term dependencies in processing lengthy sequences. In recent years, there has been a significant amount of research leveraging the Transformer architecture [8] to tackle natural language processing tasks, because it can model relationships between long sequences using attention mechanisms. Currently, pre-trained language models based on Transformer, such as BERT [9], RoBERT [10], GPT-3 [11], BART [12], and T5 [13] have demonstrated remarkable performance in various NLP tasks. Among them, BERT is pre-trained with two self-supervised learning methods: Masked language modeling (MLM) and next sentence prediction (NSP). MLM involves replacing certain tokens in the input sentences with [MASK] or other tokens and predicting their corresponding positions. NSP concatenates two sentences with the token [SEP] in between and predicts whether the two sentences are semantically related based on the [CLS] token positioned at the beginning of the input sequence [9]. While BERT has demonstrated excellent performance in various natural language processing tasks, its application to log anomaly detection, such as MIM tasks, still has certain limitations.
Traditional machine learning and deep learning methods typically assume that training and test data come from the same distribution, meaning the categories seen during training are entirely consistent with those encountered during testing. This approach is known as a closed-set recognition paradigm [14]. In this paradigm, the model classifies and recognizes data by learning features from the training data. However, its performance can be limited in practical applications, especially when encountering new, unseen categories or anomalies. For instance, in the task of log anomaly detection, data often follow a long-tail distribution [15], with anomalies being rare and dynamically changing. In a closed-set recognition paradigm, the model may not effectively discover new categories or anomalies in the logs. This limitation arises because the model is not equipped to handle cases where the test data include classes or anomalies not present in the training data.
To address this challenge, the introduction of an open-set recognition mode is particularly important [16]. In the open-set recognition mode, the model can more flexibly handle different categories or data distributions, meaning it can face different log anomaly situations during both the training and testing phases. In addition to open-set recognition mode, there is another important approach called evidential deep learning (EDL) [17,18] for tasks such as anomaly detection. Evidential learning is a method for handling uncertainty, and its core idea is to better model and infer data by introducing uncertainty into the model. Unlike traditional closed-set recognition mode, evidential learning not only considers the features of known data but also quantifies the model’s confidence in each prediction. In the context of anomaly detection, evidential learning can help the model identify which data points have higher confidence and which may represent unseen anomalies. In this way, evidential learning can not only identify known anomaly categories but also provide inference and modeling for unknown anomaly situations, thereby improving the robustness and accuracy of anomaly detection systems. In summary, evidential learning is an important method for handling uncertainty and unknown data, similar to the functionality of open-set recognition mode, and can provide a more comprehensive and reliable solution for tasks such as anomaly detection.
In this paper, we pay close attention to the issue of uncertainty estimation in log data and design an evidential learning loss function to supervise the network. Specifically, we replace the output parameters of the network with the parameter set of Dirichlet density. The Dirichlet distribution is a multivariate probability distribution that effectively describes the uncertainty of data. Through this substitution, our model can not only learn the distribution characteristics of normal log sequences but also make anomaly judgments by evaluating uncertainty when facing abnormal logs. To better reflect real-world scenarios, we only use normal log data to train the model, and then, evaluate both normal and abnormal log data separately during testing.
The main contributions of this paper are as follows:
  • Analyzing the similarity between the log anomaly detection task and open-set recognition, and introducing the relationship and differences between open-set recognition and evidential learning, clarifying the applicability of evidential learning to log anomaly detection methods.
  • Proposing an evidential learning network, LogEDL, suitable for log anomaly detection, enabling the model to identify unknown logs and quantitatively assess the uncertainty of unknown data, thereby assisting in identifying anomalous data.
  • Applying evidential learning algorithms to log anomaly detection tasks on public datasets, demonstrating the effectiveness and generalization ability of the proposed method.

2. Related Work

In this section, we first introduce the application of the self-training paradigm in log anomaly detection. Subsequently, we summarize the methods of semi-supervised log anomaly detection based on deep learning introduced in recent years.

2.1. Paradigm of Self-Training

Self-supervised pre-training is a significant research topic aimed at learning generalizable and shareable knowledge from large-scale data, which further benefits downstream tasks. The pretext tasks of self-supervised learning can be broadly divided into contrastive learning and masking modeling. In recent years, with the maturation of contrastive learning and masking modeling techniques, several self-supervised pre-training methods designed for log sequences have emerged.
In log sequences, the masking modeling paradigm is commonly applied, where the model is optimized by reconstructing the masked content from the unmasked portions. LogBERT [19] enhances the self-supervised training approach based on BERT [9] by introducing two novel self-supervised training tasks. To adapt to log sequences, masked log key prediction (MLKP) is proposed to enable the network to learn patterns of normal log sequences. The NSP of BERT is transformed into the volume of hypersphere minimization (VHM). LAnoBERT [20] utilizes masked language modeling based on BERT to train the model and employs the masked language modeling loss function for each log key during testing, enabling unsupervised anomaly detection. The LogFiT [21] model utilizes the RoBERTa model to handle log datasets containing up to 512 tokens per sample, while the Longformer model is employed for datasets where the token count per sample exceeds 512. Similarly, it employs BERT-based masked language modeling to learn the language patterns of normal log data. The encoder of BERT and its self-supervised paradigm enable it to generate contextually sensitive log keys for the input log sequences and reconstruct the masked log sequences. However, directly masking log sequences disrupts the inherent structure of log sequences, making reconstruction overly challenging and unable to guide representation learning. In contrast to the direct reconstruction approach used in previous works, MMSM proposes a novel masking modeling task, which involves reconstructing the original log sequence from multiple randomly masked log sequences.

2.2. Semi-Supervised Anomaly Detection

DeepLog models the error between the predicted vector and the actual vector in the validation set as a Gaussian distribution. During testing, if the error falls within the high-confidence interval of the Gaussian distribution, the parameter value vector of the log entry is considered normal. Otherwise, it is deemed anomalous. LogBert establishes a candidate set consisting of g normal log keys. If the log key is in the candidate set, it is considered normal. Otherwise, it is deemed an anomalous log key. Subsequently, when a log sequence consists of more than r anomalous log keys, the sequence is labeled as anomalous. LAnoBERT utilizes computed loss errors and prediction probabilities for anomaly detection. When the probability of predicting a log occurrence is low, it is difficult to find the corresponding context in the normal log context. Thus, it is identified as an anomalous log sequence. LogFiT is trained only on normal log data using masked sentence prediction. When new log data are used, the t o p k prediction accuracy of the model can serve as a threshold to judge whether the new log data deviate from the normal log data. The aforementioned methods distinguish anomalous log sequences based on data distribution or empirical thresholds. Enabling the neural networks to recognize log sequences belonging to anomalous data distributions is achieved by making the network autonomously determine whether a log sequence is anomalous. Placing a Dirichlet distribution on class probabilities, we treat the neural network predictions as subjective opinions and learn a function from the data that collects evidence leading to these opinions of deterministic neural networks. Leveraging evidential neural networks, the network can autonomously identify normal log sequences and anomalous log sequences.

3. Preliminary

3.1. Background of Open-World Learning

In real-world recognition/classification tasks, it is usually difficult to collect training data for all classes when training a recognizer or classifier due to various objective factors. The dataset is typically closed-set in deep learning, with the training and test data having the same annotations and feature space. Based on this assumption, traditional recognition and classification algorithms have achieved remarkable success in various machine learning tasks. However, real-world scenarios are often open-set and non-smooth, such as log fault detection, where the emergence of invisible situations significantly weakens the robustness of these existing approaches. To address this challenge, this requires a model that can both recognize known normal log sequences and reject unknown log faults.
Previously, researchers have proposed open-set recognition (OSR), which cannot fully learn all data knowledge during training, but the model can recognize unknown category data during testing. This requires the classifier to be able to accurately recognize not only the visible categories but also the unseen ones. Due to the small number of abnormal log sequences, previous researchers have usually used semi-supervised log anomaly detection methods, where only normal log sequences are targeted during training and abnormal log sequences need to be found during testing. A general framework for open-set recognition learning algorithms can help us to continuously recognize unknown category data.

3.1.1. Open-World Learning Algorithms

Mohsen Jafarzadeh et al. [16] developed a generalized framework for open-world learning algorithms containing six main elements: feature extraction, known classifications, novelty detection, novelty discovery, novelty management, and modified incremental learning. The implementation of AIOps is the same process as the open-world learning algorithm, except for the self-healing. One of the most important processes in AIOps is log anomaly detection, which belongs to novelty detection in the open-set recognition framework. The complexity of open-world learning lies in the fact that the dataset is a function of time. Specifically, as time progresses, initially unknown data can be labeled to become known.

3.1.2. Open-World Learning Processes

Figure 1 shows the open-world learning process. The open-world stream is defined as S k O = x k Q k | Q k W k , the flow of which is a time sequence. Each member is a single or batch of data points x k drawn from the query set Q k at time step k 1 . W k corresponds to the data of the whole world. The whole process of training the model at time step k is A g e n t k . During open-world learning, the model trains a feature extractor and a decoder on a closed-set dataset. In the open-set world stream S O , the sample x k undergoes feature extraction to obtain the feature representation f k through the feature extractor E k . Subsequently, the decoder D k is used to compute the probability P k of the data belonging to unknown, known, and discovered classes, P k = p u , p K 1 , p K 2 , , p K n 1 , p K n , p D 1 , p D 2 , , p D m k 1 , p D m k T where n is the number of known categories in the training set, and m k is the number of discovery categories. If the unknown probability p u is less than a threshold τ , the buffer B k is equal to the memory bank M k . Otherwise, the buffer B k is equal to the cascade of features f k and memory banks M k . Each instance of the buffer B k is given a supervised (human or another agent) or unsupervised label by novelty discovery using the function C k . Finally, the A g e n t k is updated by adapting to new data based on the buffer B k and supervised/unsupervised labels. In the subsequent time step k + 1 , the agent A g e n t k + 1 is utilized for improved incremental learning, continuing this cycle until all classes are discovered.

3.2. Background of Evidential Deep Learning

Existing deep learning-based models typically use a softmax layer at the top of deep neural networks (DNNs) for classification, using maximum likelihood estimation (MLE) to find the best network parameters. However, these softmax-based DNNs are unable to estimate predictions for classes outside of the closed set, because the softmax scores are inherently point estimates of the predictive distribution. For out-of-distribution categories, the outputs of the softmax layer tend to be overconfident in false predictions. Out-of-distribution anomaly detection can be implemented in a variety of ways, with EDL [17,18] networks being a natural approach that allows the network to effectively say “no”.
EDL overcomes the limitations of softmax-based DNNs by introducing Dempster’s evidential framework, Shafer theory (DST) [22], and subjective logic (SL). EDL combines multi-class classification and uncertainty modeling to provide interpretable methods. Specifically, EDL interprets the standard output of the classification network as a distribution over any possible belief state categories. Assuming that category probabilities follow a prior Dirichlet distribution, the set of distribution parameters is replaced with the parameters of the Dirichlet density for novelty detection.

4. Methodology

In this section, the main networks used in the proposed method and the architecture of the proposed model are explained. Section 4.1 gives the description and importance of masked language modeling (MLM), Section 4.2 presents the uncertainty in log sequence detection, Section 4.3 introduces log preprocessing, Section 4.4 offers the problem definition, and Section 4.5 introduces the LogEDL model.

4.1. Masked Language Model

The operating mechanism of LogEDL proposed in this study is shown in Figure 2. Since LogEDL performs anomaly detection through the pre-training method of MLM of BERT and the EDL method, a detailed description of MLM is given in this section, and a detailed description of the EDL method in the log anomaly detection process is given in Section 4.2.
The reasons for using MLM for system log anomaly detection are as follows. Due to the existence of a large amount of log data, there are enough data to effectively pre-train BERT using the MLM approach, resulting in a large number of contextual and structural features of the log sequences. MLM is inspired by the completion task, which replaces certain tokens of the input sentence with [MASK], and then, predicts the token in the [MASK] tokens. Bert is a large-scale bidirectional (fully contextual) trained model, which means that the model takes into account the contextual information of the entire input sequence when generating the representation of each word, unlike the pre-training of left- or right-directed language models. The LogEDL model uses the MLM-trained model for anomaly detection, which is expected to improve the generalization performance of the logs for effective anomaly detection.
Second, the task of labeling log sequences is very difficult, and the number of normal log sequences is much larger than the abnormal log data. Anomaly detection is a method based on unsupervised learning that uses only normal data for training to detect anomalies. While MLM is a self-training task, it does not need to label the data, and it is suitable for cases where the normal data are much larger than the abnormal data, which meets the purpose of anomaly detection. Therefore, it is more suitable than supervised binary classification-based methods for situations where there is a large amount of normal data.
Finally, from a practical operations perspective, experts detect anomalies by comparing the actual log keys with the generated log keys. While MLM methods can focus on patterns in context, they tend to have lower prediction probabilities for abnormal patterns [20]. However, MLM training methods cannot yet express anomalies.

4.2. Uncertainty in Log Sequence Detection

In this paper, we apply EDL combined with the MLM method to construct anomaly log sequence detection.
First, valuable semantic information is mainly contained in log sequence variations such as trends, periods, and peaks and valleys, which may correspond to the system state. For log sequences, there is a correlation between the logs at each location in the log sequence and the nearby logs. Anomalous log sequences are often the result of unexpected logs appearing at log locations where they should be.
Second, recent models using the MLM approach in BERT cannot detect anomalies autonomously. However, researchers have been able to detect anomalies through some phenomena such as low prediction probability of anomalous logs and large loss values [20]. Because the logs on the mask can be in multiple situations, normal logs can be mistaken for anomalous logs by simple presentation methods.
We propose a log anomaly detection system, LogEDL, that exploits the fact that EDL can be characterized by high uncertainty values for unseen patterns to overcome the limitations of existing methods. Uncertainty modeling is performed for each [mask] location, and the uncertainty of the [mask] location responds to the likelihood of an anomaly occurring there. In the training phase, by applying EDL to the MLM learning of normal logs, we are essentially trying to collect evidence of the classes reflected by the context at each mask. In the testing phase, the assumption of contextual uncertainty at each mask allows the model to “know the unknown”. Therefore, uncertainty is utilized to detect anomalies in the logs.

4.3. Preprocessing

There are a number of log parsing methods, such as Spell [23], IPLoM [24], Drain [25], and so on. According to previous studies [26], weak log parsing methods can negatively affect the performance of subsequent anomaly detection tasks. Drain has become a common method used by researchers with its superior accuracy and efficiency [27,28]. Therefore, in this work, we use Drain for log message parsing. As shown in Figure 2, the HDFS dataset is used as an example. Each raw log message consists of a constant part (also known as “log keys” or “log events”) and a variable part (also known as “parameters”). The logs are first parsed into log keys using the method of Drain, then each log is mapped to its key to obtain structured logs, and finally, a vocabulary of log keys is constructed, and a log sequence is obtained by sorting the log data in time order according to the block of the log data.

4.4. Problem Definition

Log anomaly detection in this study can be defined as follows. Given an unstructured sequence of log messages, we aim to detect whether this sequence is normal or abnormal. We can then define the log sequence as an ordered sequence of log keys S = k 1 , , k t , , k T , where k t V represents the log key at position t, and V denotes the set of unique log keys extracted from the log messages. The goal of this task is to predict whether a new log sequence S is abnormal or not based on a training dataset D a t a s e t t r a i n = S i i = 1 N that contains only normal log sequences. To achieve this goal, LogEDL models normal log sequences and further derives an anomaly detection criterion to identify anomalous sequences. In the training phase, normal log key sequence keys are replaced by [MASK] tokens with a certain probability for network optimization; in the testing phase, the replacement is performed with the same probability to determine whether a log sequence is normal or not for the number of uncertainty log keys.

4.5. LogEDL

In this section, we present LogEDL, a semi-supervised log representation framework for anomaly detection. An overview of the proposed LogEDL framework is shown in Figure 3. It consists of three main components, Transformer Encoder, ENN head, and uncertainty. Transformer Encoder is used after the log sequence is tokenized to extract the contextual information of the log sequence and transform it into semantic vectors. In the second step, ENN head is used to convert the semantic vectors into evidence of the logs, which is the core of LogEDL, and finally, uncertainty is applied to make the judgment of anomaly detection based on the computed uncertainty. For this purpose, we build an evidential deep learning anomaly detection model. It mainly solves the problem of how to extract evidence of separable features with contextual information, which means that normal and abnormal sequences have boundaries in the feature space. Finally, the uncertainty of the extracted evidence is computed for anomalous log sequence detection. We describe each component in detail in the following subsections.

4.5.1. Transformer Encoder

We treat log sequences as sentences in natural language and use a Transformer Encoder to extract the semantic vectors of log keys and capture the input log sequence contextual semantic information through a multi-head attention mechanism. The Transformer Encoder consists of multiple transformer layers. Each transformer layer consists of a multi-head self-attention and a position-wise feed-forward sub-layer using residual connection around the two sub-layers followed by layer normalization [8]. The sequence of logs S = k 1 , , k t , , k T , where T is the sequence length, then represents each log key k t as an input representation x t , where the representation x t is obtained by using the tokenizer, resulting in X = x 1 , , x t , , x T . Secondly it is used as input to the Transformer Encoder to obtain a d-dimensional semantic vector h t , where d is set to 256. Finally, we obtain the sequence of semantic vectors, written as H = h 1 , , h t , , h T . To summarize, the Transformer Encoder represents the log keys with semantic vectors, which preserves the semantic information of the events; similar log keys also have similar semantic vectors, mitigating the effect of unstable logs and noise.

4.5.2. ENN Head

After the Transformer Encoder, each log key is represented as a semantic vector. To detect anomalous sequences, we propose an evidential neural network head (ENN head) based on an uncertainty mechanism, as shown in Figure 4. This module includes two fully connected (FC) layers, which are used to learn the evidence of contextual patterns across the entire sequence. Given a sequence of semantic vectors, H = h 1 , , h t , , h T , the evidence E = e 1 , , e t , , e T for this sequence is learned in two layers of FC after the ENN head. Note that we have the last layer of hidden states as output, denoted as
e t = σ ( w 2 σ w 1 h t + b 1 + b 2 )
where w 1 , w 2 , b 1 , and b 2 are the trainable parameters of the input h t , and σ ( · ) is the ReLU function.
When we obtain the evidence e t , it can efficiently learn the information about the mask position of the input log sequence about the context and use the last step of the hidden state of the output as a representation of the context pattern of this log key position. To achieve this goal, we propose MMSM to model normal sequences, followed by log sequence-wise contrastive learning for representation learning, and further, utilize an evidential neural network module to derive an anomaly detection criterion for identifying anomalous sequences.

4.5.3. Uncertainty

After obtaining the evidence, the Dirichlet prior distribution is utilized to compute the uncertainty, which is then used for subsequent anomaly detection. The Dirichlet distribution is a probability density function (pdf) that defines the possible values of a probability mass function (pmf) p. It is characterized by K parameters α = α 1 , , α k , , α K and is expressed as follows:
D i r p | α = 1 B α k = 1 K p k α k 1 , f o r p P K 0 , o t h e r w i s e
where P K is the K-dimensional unit simplex, P K = p i = 1 K p i = 1 a n d 0 p 1 , , p K 1 α k represents the concentration parameter of the Dirichlet distribution, and K denotes the number of log key classes.
According to belief theory [29], subjective logic provides a belief mass b k for each singleton k = 1 , , K , along with an overall uncertainty mass u. These K + 1 mass values are non-negative and sum to 1, i.e.,
u + k = 1 K b k = 1
where u 0 and b k 0 , for k = 1 , , K .
A belief mass b k for a singleton k is computed using evidence for a singleton. Let e k 0 be the evidence derived for the k th singleton, then the belief b k and the uncertainty u are computed as
b k = e k S and u = K S
where S = k = 1 K α k is referred to as the Dirichlet strength, and a belief mass assignment, i.e., subjective opinion, corresponds to a Dirichlet distribution with parameters α k = e k + 1 .
The probability is given by
p k = α k S
We optimized the network by setting a suitable loss function, enabling it to effectively learn normal log sequences. By leveraging uncertainty, we identified unknown anomalous logs, thus determining whether a log sequence is anomalous. We use the K-simplex (illustrated as a triangular heatmap in Figure 5) to jointly represent the token classification probability and uncertainty at the masked positions. The uncertainty detection at [MASK] is particularly suitable for log anomaly detection. Using a three-class classification as an example and assuming the first class is the correct label, a well-calibrated model should give accurate and certain (AC) predictions (Figure 5a), indicating that the context for the [MASK] token is very certain. Accurate and uncertain (AU) predictions (Figure 5b) indicate that the model is somewhat confused by the context and cannot classify it well. Inaccurate and certain (IC) predictions (Figure 5c) suggest that the [MASK] token could have multiple possible values, which aligns well with the contextual variability in log sequences. Inaccurate and uncertain (IU) predictions (Figure 5d) indicate that the context for the [MASK] token is completely unfamiliar, suggesting a high likelihood of the log sequence being anomalous.

4.5.4. Anomaly Detection

After training, we can deploy LogEDL for detecting anomalous log sequences. The idea behind applying LogEDL for log anomaly detection is that “there are differences in the context between normal system logs and anomalous system logs”. In other words, when a language model trained solely on normal log data encounters the context of anomalous logs during testing, it is expected to exhibit higher uncertainty.
In this study, the defined uncertainty refers to the logit values produced by the model when predicting the [MASK] token, indicating the network’s inability to make a judgment on this contextual pattern. Furthermore, when the uncertainty is high, it suggests that the corresponding context is difficult to find in normal contexts, thus identifying it as an anomaly.
Therefore, we can derive the anomaly score of a log sequence based on the predicted logits for the [MASK] token. To achieve this, given a test log sequence, we first randomly replace a certain proportion of log keys with the [MASK] token, similar to the training process, and use the randomly masked log sequence as input to LogEDL. The uncertainty of the tth log key refers to the degree of unknowns represented by u t when the log key at the [MASK] position is considered as the answer. For each [MASK] token, we compute u t , which reflects the uncertainty at this masked position. For N [MASK] tokens, we select the t o p n u t values and compute the final anomaly score to detect anomalies. The formula for calculating the anomaly score of a test log sequence is shown in Equation (6).
abnormal = 1 n t T o p n i n d i c e s u t

4.5.5. Evidential Uncertainty Loss

To train the LogEDL model, we follow the MLM paradigm to capture patterns in normal log sequences. The neural network architecture of LogEDL is very similar to that of a classical neural network. The only difference is that we replace the softmax layer with an activation layer, such as ReLU, to ensure non-negative outputs, which serve as the evidence vector for predicting the Dirichlet distribution.
Given a sample k i , let f ( k i | Θ ) represent the evidence vector e i predicted by the network for classification, where Θ denotes the network parameters. The corresponding Dirichlet distribution has parameters α i = f ( k i | Θ ) + 1 . Once these distribution parameters are computed, their mean, k i / S , can be used as an estimate of the class probabilities. Let the ground truth y i be the one-hot vector encoding the observation k i , with y i j = 1 and y i j = 0 for all i j . Here, α i is the parameter of the Dirichlet density for the predictor. Assuming that class probability follows a prior Dirichlet distribution, the evidential mean squared error loss (EMSE) to be minimized for learning eventually reduces to the following form.
L E M S E i Θ = y i p i 2 2 1 B ( α i ) i = 1 K p i j α i j 1 d p i = j = 1 K E [ y i j 2 2 y i j p i j + p i j 2 ] = j = 1 K ( y i j 2 2 y i j E [ p i j ] + E [ p i j 2 ] ) = j = 1 K ( y i j α i j / S i ) 2 + α i j ( S i α i j ) S i 2 ( S i + 1 ) = j = 1 K ( y i j p i j ) 2 + p i j ( 1 p i j ) ( S i + 1 )
By decomposing the first and second moments, the loss function aims to achieve a joint objective of minimizing both the prediction error and the variance of the Dirichlet distribution generated by the neural network for each sample in the training set. In this way, it prioritizes data fitting over variance estimation. Given that the patterns of normal log sequences and anomalous log sequences are different, we expect that once LogEDL can correctly predict the masked log keys, it will be able to distinguish between normal and anomalous log sequences.
We can obtain the negative log marginal likelihood by integrating out the class probability; the evidential negative log-likelihood loss (ENL) takes
L E N L i Θ = log ( j = 1 K p i j y i j 1 B ( α i ) i = 1 K p i j α i j 1 d p i ) = j = 1 K y i j ( ψ ( S i ) ψ ( α i j ) )
The same approach can be applied also to the cross-entropy loss, the evidential cross-entropy loss (ECE) reads
L E C E i Θ = j = 1 K y i j log ( p i j ) 1 B ( α i ) i = 1 K p i j α i j 1 d p i = j = 1 K y i j ( ψ ( S i ) ψ ( α i j ) )

5. Experiment and Analysis

5.1. Experiment Setting

5.1.1. Dataset

We benchmark our log anomaly detection method on three log datasets: HDFS [30], BGL [27], and Thunderbird [31]. These datasets are sourced from the large-scale log dataset LogHub, published by Jieming Zhu et al. [32]. The statistics of these datasets are shown in Table 1. These datasets have been preprocessed as described earlier, with log data grouped into log sequences. For the HDFS dataset, data are partitioned using Block ID, while the BGL and Thunderbird datasets are partitioned using a time window. The preprocessing results are shown in Table 2.
The HDFS dataset was generated by running benchmark workloads in a private cloud environment and was manually labeled using hand-crafted rules to identify anomalies. Log data were divided into log sequences based on block IDs. Each log sequence associated with a block ID was assigned a ground truth label of either normal or anomalous. The HDFS dataset contains 11,175,629 log messages, grouped into 742,527 log sequences, with 725,689 normal sequences and 16,838 anomalous sequences. The average sequence length is 19. A total of 47 log keys were extracted from the dataset, with 18 log keys appearing in normal sequences. The model was trained on this dataset for 200 epochs with a masking ratio of 0.65.
The BGL dataset comes from the BlueGene/L supercomputer system at the Lawrence Livermore National Laboratory (LLNL) in the United States. The logs include both alert and non-alert messages, with alert messages considered anomalies. The BGL dataset contains 4,747,963 log messages, grouped into 37,315 log sequences, with 10,131 normal sequences and 2630 anomalous sequences. For BGL, the data were partitioned using a sliding time window of 5 min to generate log sequences, with an average sequence length of 562. A total of 334 log keys were extracted from the dataset, with 175 log keys appearing in normal sequences. The model was trained on this dataset for 200 epochs with a masking ratio of 0.50.
The Thunderbird dataset is another large log dataset collected from a supercomputer system, specifically the Thunderbird microprocessor. The logs contain both alert and non-alert messages, identified by alert category labels. In the first column of the logs, “-” indicates a non-alert message, while other entries indicate alert messages. This labeling information can be used for alert detection and prediction research. The Thunderbird dataset contains 20,000,000 log messages, grouped into 122,540 log sequences, with 77,155 normal sequences and 45,385 anomalous sequences. For the Thunderbird microprocessor dataset, we used a sliding time window of 1 min to generate log sequences, with an average sequence length of 326. A total of 1165 log keys were extracted from the dataset, with 866 log keys appearing in normal sequences. The model was trained on this dataset for 200 epochs with a masking ratio of 0.50.

5.1.2. Implementation Details

The model was implemented using the open-source deep learning framework PyTorch (v1.9.0, created by the Meta Platforms, Menlo Park, CA, USA), and it was run on a server equipped with an AMD EPYC 7773X 64-core processor (manufactured by AMD, Santa Clara, CA, USA) and an Nvidia GeForce RTX 3090 GPU (NVIDIA, Santa Clara, CA, USA). The network was optimized using the Adam optimizer with a learning rate of 1 × 10−4. A validation set was used to select the best model for testing.

5.1.3. Evaluation Metrics

In this study, similar to previous research, we use the F1 score, precision, and recall as evaluation metrics to validate the effectiveness of the LogEDL model for anomaly detection. precision represents the percentage of true anomalies among all detected anomalies, while recall represents the percentage of detected anomalies in the anomalous dataset. The F1 score is calculated as the harmonic mean of these two metrics, as shown below:
p r e c i s i o n = T P T P + F P
r e c a l l = T P T P + F N
F 1 s c o r e = 2 · p r e c i s i o n · r e c a l l p r e c i s i o n + r e c a l l
where T P is true positive, F P is false positive, and F N is false negative. The F1 score ranges from 0 to 1, with higher values indicating better performance of the classifier. A higher F1 score signifies that the model has a good balance between precision and recall, effectively capturing the overall performance in anomaly detection. This makes the F1 score a comprehensive metric for evaluating the model’s effectiveness in identifying anomalies.

5.1.4. Baselines

To evaluate the performance of LogEDL, we compare it with the following log anomaly detection methods:
Principal component analysis (PCA) [30]: A traditional machine learning method for dimensionality reduction-based anomaly detection, combined with item weighting techniques from the data retrieval field. Suitable for simpler data scenarios.
Isolation Forest (iForest) [33]: An unsupervised learning algorithm for anomaly detection that represents features as tree structures.
One-class SVM (OCSVM) [34]: A well-known model for one-class classification, widely used for anomaly detection in log data where only normal data are observed.
LogCluster [4]: Based on similarity clustering methods, LogCluster automatically identifies similar log patterns and clusters them to achieve automatic anomaly recognition.
DeepLog [7]: An anomaly detection model based on log templates which uses LSTM to model log data, automatically learns patterns of anomalous behavior, and compares predicted logs with real logs for anomaly detection.
LogAnomaly [35]: Integrates log templates by analyzing synonyms in logs; encodes log templates into semantic vectors and inputs them into an LSTM model for anomaly detection.
LogBERT [19]: A method based on BERT, LogBERT constructs two self-supervised training tasks to learn patterns of normal log sequences and detect anomalies deviating from the normal model.

5.2. Results and Analysis

5.2.1. Comparison Methods

Our method LogEDL is compared with traditional machine learning and deep learning approaches. The comparative experiments are shown in Table 3; traditional anomaly detection methods, such as PCA, Isolation Forest, and OCSVM, demonstrate suboptimal performance across the three datasets. Although these methods sometimes achieve high precision or recall, for instance, PCA’s recall reaches 100 % on all datasets, their F1 score remain exceedingly low. This indicates an inability to balance precision and recall effectively, likely due to their failure to capture the temporal sequence information inherent in log data, resulting in inadequate anomaly detection capabilities.
LogCluster, specifically designed for log anomaly detection, shows improvements over traditional methods, particularly on the HDFS and BGL datasets. However, its performance on the Thunderbird dataset remains unsatisfactory, with F1 score failing to reach high levels.
DeepLog and LogAnomaly, two deep learning-based methods, significantly outperform the traditional methods and LogCluster, showcasing the advantages of deep learning in capturing log sequence patterns. Both methods achieve high F1 score across the three datasets, especially excelling on the HDFS and Thunderbird datasets.
LogBERT, a method based on pre-trained models and self-supervised learning tasks, demonstrates superior performance across all three datasets, with F1 score markedly higher than those of traditional methods and other deep learning approaches. LogBERT successfully models normal log sequences and accurately identifies anomalous sequences through self-supervised pre-training tasks.
Extreme value theory (EVT) [36], also known as the Fisher–Tippett Theorem, is used as a simple evidence theory for anomaly detection based on the LogBERT model. However, since it relies on empirical thresholds, the results are not ideal.
Our proposed method, LogEDL, surpasses all other methods across the three datasets, exhibiting exceptional performance. On the HDFS dataset, LogEDL achieves an F1 score of 91.41, significantly higher than LogBERT’s 82.32. On the BGL dataset, LogEDL’s F1 score of 98.53 substantially exceeds LogBERT’s 90.83. On the Thunderbird dataset, LogEDL’s F1 score of 97.91 outperforms LogBERT. This demonstrates that LogEDL maintains high precision and recall while achieving the best F1 score.
The comparative analysis indicates that LogEDL outperforms other methods in log anomaly detection tasks. Traditional methods (PCA, Isolation Forest, OCSVM) exhibit significant shortcomings in balancing precision and recall, resulting in low F1 score. The specialized method LogCluster shows some improvements but still lags behind deep learning methods. DeepLog and LogAnomaly demonstrate the strengths of deep learning, while LogBERT further enhances performance through self-supervised learning. Ultimately, LogEDL consistently achieves the best overall performance across the three datasets, proving its efficiency and reliability in log anomaly detection tasks.
In real-time log anomaly detection, computational efficiency is crucial. In Table 4, we analyzed computational efficiency using the HDFS dataset. The results show that PCA and iForest have the shortest computation times, followed by LogCluster, DeepLog, LogBERT, and LogEDL, with OCSVM being the slowest. DeepLog and LogAnomaly have relatively low computation and parameter counts with moderate computation times, making them efficient methods. Although LogEDL has the highest computation and parameter counts, its computation time is similar to LogBERT. For practical online deployment, our method’s inference time remains long, necessitating future research on model acceleration and quantization.

5.2.2. Ablation Studies

The ablation experiments are shown in Table 5. Across all three datasets, the LogEDL model optimized with the ECE loss function demonstrates the best performance. ECE outperforms other methods regarding precision, recall, and F1 score. Notably, on the BGL dataset, its precision reaches an almost perfect 99.84 % . Compared to LogBERT, the LogEDL model shows improvements in all cases, especially when using the E C E loss function, resulting in significant enhancements. Therefore, for similar log anomaly detection tasks, it is recommended to use the LogEDL model optimized with the evidence cross-entropy loss function to achieve the best performance.

6. Discussion

We have demonstrated the feasibility and effectiveness of using uncertainty to identify anomalous logs in LogEDL, showcasing the significant potential of evidential neural networks in practical log anomaly detection. Nevertheless, several open research questions related to log anomaly detection remain to be further explored and elucidated.
In the real world, log patterns continuously evolve with software updates or system configuration changes. LogEDL assumes that log templates are stable and unchanging, which hinders the model’s ability to detect anomalies due to changes in log patterns. However, with the advancement of large language models (LLMs), current changes in log patterns can be easily transformed into our desired format. We propose developing a log template management system that combines LLMs and machine learning technologies to automatically detect and update log templates. This system will ensure the accuracy of log parsing and anomaly detection. For logs that differ significantly from the existing log template set, an online learning or incremental learning framework should be utilized to update the log collection.
The interpretability of deep learning models is crucial. The LogEDL model quantifies the degree of anomaly in logs using uncertainty, yet this study does not delve deeply into the relationship between the sequence of logs labeled as anomalies and the underlying causes of these anomalies. By employing masked language modeling (MLM), the LogEDL model effectively learns the contextual relationships of normal log sequences and identifies logs that do not conform to contextual semantics as anomalous. The process of log templating can result in the loss of some critical information inherent in the original logs, which hinders the interpretability of log anomalies. In the future, deep learning techniques should be utilized to extract latent semantic vectors from logs to better understand the reasons behind certain log sequences being marked as anomalies. Integrating interpretable AI techniques will enhance the interpretability of the anomaly detection process.
The scalability of LogEDL in handling large volumes of log data has yet to be thoroughly investigated. In practical applications, logs are generated in the thousands, necessitating the anomaly detection system to scale accordingly. These models must be able to operate efficiently with varying scales of log data. In the future, message queues could be employed to manage sudden surges of log sequences, custom-adapting to existing monitoring tools and databases.
Future research could explore the development of more computationally efficient, highly generalizable, and scalable models that require minimal normal data for training, thereby quickly adapting to changes in real-world applications. Additionally, utilizing large models and incremental learning strategies could be beneficial. With this approach, the model could be initially labeled using a large model, and as new data are parsed, the model could be updated incrementally. This could help the system adapt to evolving logs without requiring extensive computational resources.

7. Conclusions

This paper proposes a log sequence anomaly detection framework based on evidential deep learning, named LogEDL. This method goes beyond traditional log sequence anomaly detection approaches by introducing a new task that leverages uncertainty to identify anomalies. Specifically, LogEDL not only prioritizes precise classification but also quantifies the uncertainty of prediction outcomes, thereby augmenting the model’s robustness and accuracy in the context of anomalous log detection tasks. This functionality is similar to open-set recognition patterns. The experimental results show that compared to state-of-the-art anomaly detection methods, LogEDL can maximally learn various contextual patterns of normal log sequences, thereby achieving advanced performance in anomaly detection tasks. In the future, we plan to further extend LogEDL to large-scale and diverse log datasets to establish a foundational model for log sequence analysis.

Author Contributions

The conceptualization and design of the study were led by Y.D., K.X., H.S. and Z.O. Experiments were carried out by Y.D., K.X., H.B., X.J. and Y.W. Data were analyzed by Y.D., K.X. and Z.Y. The framework was developed by Y.D., Z.O. and K.X. The manuscript was primarily written by Y.D. and K.X., with substantial contributions from H.S., Y.Z., Z.O., X.J., S.Y. and B.D. Provided critical feedback and helped shape the research, analysis, and manuscript. Y.D. and K.X. made significant contributions to the preparation, execution, and analysis of this study, which justifies a shared first-authorship. As Y.D. initiated the study (together with B.D., J.C. and Z.O.), he is listed first among the shared first authors. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Natural Science Foundation of China under Grant 62076035 and Grant U21B2022.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The research data of this paper is available by contacting the corresponding author upon reasonable requests.

Acknowledgments

The authors would like to thank the anonymous reviewers for their invaluable comments.

Conflicts of Interest

Authors Yunfeng Duan, Hao Sun, Jiaxing Chen and Boya Duan were employed by the company China Mobile Communications Group Co., Ltd. The remaining authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
MLMachine learning
DLDeep learning
MLMMasked language modeling
NSPNext sentence prediction
EDLEvidential deep learning
VHMVolume of hypersphere minimization
OSROpen-set recognition
DNNs    Deep neural networks
MLEMaximum likelihood estimation
DSTShafer theory
SLSubjective logic
FCFully connected
ACAccurate and certain
AUAccurate and uncertain
ICInaccurate and certain
IUInaccurate and uncertain
EMSEEvidential mean squared error loss
ENLEvidential negative log likelihood loss
ECEEvidential cross-entropy loss
LLNLLawrence Livermore National Laboratory
PCAPrincipal component analysis
iForestIsolation Forest
OCSVMOne-class SVM

References

  1. He, S.; He, P.; Chen, Z.; Yang, T.; Su, Y.; Lyu, M.R. A survey on automated log analysis for reliability engineering. ACM Comput. Surv. (CSUR) 2021, 54, 1–37. [Google Scholar] [CrossRef]
  2. Liu, Y.; Zhang, X.; He, S.; Zhang, H.; Li, L.; Kang, Y.; Xu, Y.; Ma, M.; Lin, Q.; Dang, Y.; et al. Uniparser: A unified log parser for heterogeneous log data. In Proceedings of the ACM Web Conference 2022, Lyon, France, 25–29 April 2022; pp. 1893–1901. [Google Scholar]
  3. Ma, L.; Yang, W.; Xu, B.; Jiang, S.; Fei, B.; Liang, J.; Zhou, M.; Xiao, Y. KnowLog: Knowledge Enhanced Pre-trained Language Model for Log Understanding. In Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, Lisbon, Portugal, 14–20 April 2024; pp. 1–13. [Google Scholar]
  4. Lin, Q.; Zhang, H.; Lou, J.G.; Zhang, Y.; Chen, X. Log clustering based problem identification for online service systems. In Proceedings of the 38th International Conference on Software Engineering Companion, Austin, TX, USA, 14–22 May 2016; pp. 102–111. [Google Scholar]
  5. Xie, Y.; Zhang, H.; Zhang, B.; Babar, M.A.; Lu, S. Logdp: Combining dependency and proximity for log-based anomaly detection. In Proceedings of the Service-Oriented Computing: 19th International Conference, ICSOC 2021, Virtual Event, 22–25 November 2021; Proceedings 19. Springer: Berlin/Heidelberg, Germany, 2021; pp. 708–716. [Google Scholar]
  6. Zhang, X.; Xu, Y.; Qin, S.; He, S.; Qiao, B.; Li, Z.; Zhang, H.; Li, X.; Dang, Y.; Lin, Q.; et al. Onion: Identifying incident-indicating logs for cloud systems. In Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, Athens, Greece, 23–28 August 2021; pp. 1253–1263. [Google Scholar]
  7. Du, M.; Li, F.; Zheng, G.; Srikumar, V. Deeplog: Anomaly detection and diagnosis from system logs through deep learning. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, TX, USA, 30 October–3 November 2017; pp. 1285–1298. [Google Scholar]
  8. Vaswani, A.; Shazeer, N.; Parmar, N.; Uszkoreit, J.; Jones, L.; Gomez, A.N.; Kaiser, Ł.; Polosukhin, I. Attention is all you need. Adv. Neural Inf. Process. Syst. 2017, 30, 6000–6010. [Google Scholar]
  9. Devlin, J.; Chang, M.W.; Lee, K.; Toutanova, K. Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv 2018, arXiv:1810.04805. [Google Scholar]
  10. Liu, Y.; Ott, M.; Goyal, N.; Du, J.; Joshi, M.; Chen, D.; Levy, O.; Lewis, M.; Zettlemoyer, L.; Stoyanov, V. Roberta: A robustly optimized bert pretraining approach. arXiv 2019, arXiv:1907.11692. [Google Scholar]
  11. Brown, T.; Mann, B.; Ryder, N.; Subbiah, M.; Kaplan, J.D.; Dhariwal, P.; Neelakantan, A.; Shyam, P.; Sastry, G.; Askell, A.; et al. Language models are few-shot learners. Adv. Neural Inf. Process. Syst. 2020, 33, 1877–1901. [Google Scholar]
  12. Lewis, M.; Liu, Y.; Goyal, N.; Ghazvininejad, M.; Mohamed, A.; Levy, O.; Stoyanov, V.; Zettlemoyer, L. Bart: Denoising sequence-to-sequence pre-training for natural language generation, translation, and comprehension. arXiv 2019, arXiv:1910.13461. [Google Scholar]
  13. Raffel, C.; Shazeer, N.; Roberts, A.; Lee, K.; Narang, S.; Matena, M.; Zhou, Y.; Li, W.; Liu, P.J. Exploring the limits of transfer learning with a unified text-to-text transformer. J. Mach. Learn. Res. 2020, 21, 1–67. [Google Scholar]
  14. Geng, C.; Huang, S.j.; Chen, S. Recent advances in open set recognition: A survey. IEEE Trans. Pattern Anal. Mach. Intell. 2020, 43, 3614–3631. [Google Scholar] [CrossRef]
  15. Liu, Z.; Miao, Z.; Zhan, X.; Wang, J.; Gong, B.; Yu, S.X. Large-scale long-tailed recognition in an open world. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition 2019, Long Beach, CA, USA, 15–20 June 2019; pp. 2537–2546. [Google Scholar]
  16. Jafarzadeh, M.; Dhamija, A.R.; Cruz, S.; Li, C.; Ahmad, T.; Boult, T.E. A Review of Open-World Learning and Steps Toward Open-World Learning Without Labels. arXiv 2020, arXiv:2011.12906. [Google Scholar]
  17. Amini, A.; Schwarting, W.; Soleimany, A.; Rus, D. Deep evidential regression. Adv. Neural Inf. Process. Syst. 2020, 33, 14927–14937. [Google Scholar]
  18. Sensoy, M.; Kaplan, L.; Kandemir, M. Evidential deep learning to quantify classification uncertainty. Adv. Neural Inf. Process. Syst. 2018, 31, 3183–3193. [Google Scholar]
  19. Guo, H.; Yuan, S.; Wu, X. Logbert: Log anomaly detection via bert. In Proceedings of the 2021 International Joint Conference on Neural Networks (IJCNN), Shenzhen, China, 18–22 July 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 1–8. [Google Scholar]
  20. Lee, Y.; Kim, J.; Kang, P. Lanobert: System log anomaly detection based on bert masked language model. Appl. Soft Comput. 2023, 146, 110689. [Google Scholar] [CrossRef]
  21. Almodovar, C.; Sabrina, F.; Karimi, S.; Azad, S. LogFiT: Log anomaly detection using fine-tuned language models. IEEE Trans. Netw. Serv. Manag. 2024, 21, 1715–1723. [Google Scholar] [CrossRef]
  22. Shafer, G. Dempster-shafer theory. Encycl. Artif. Intell. 1992, 1, 330–331. [Google Scholar]
  23. Du, M.; Li, F. Spell: Streaming parsing of system event logs. In Proceedings of the 2016 IEEE 16th International Conference on Data Mining (ICDM), Barcelona, Spain, 12–15 December 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 859–864. [Google Scholar]
  24. Makanju, A.A.; Zincir-Heywood, A.N.; Milios, E.E. Clustering event logs using iterative partitioning. In Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, 28 June–1 July 2009; pp. 1255–1264. [Google Scholar]
  25. He, P.; Zhu, J.; Zheng, Z.; Lyu, M.R. Drain: An online log parsing approach with fixed depth tree. In Proceedings of the 2017 IEEE International Conference on Web Services (ICWS), Honolulu, HI, USA, 25–30 June 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 33–40. [Google Scholar]
  26. Huang, S.; Liu, Y.; Fung, C.; He, R.; Zhao, Y.; Yang, H.; Luan, Z. Paddy: An event log parsing approach using dynamic dictionary. In Proceedings of the NOMS 2020–2020 IEEE/IFIP Network Operations and Management Symposium, Budapest, Hungary, 20–24 April 2020; IEEE: Piscataway, NJ, USA, 2020; pp. 1–8. [Google Scholar]
  27. Zhu, J.; He, S.; Liu, J.; He, P.; Xie, Q.; Zheng, Z.; Lyu, M.R. Tools and benchmarks for automated log parsing. In Proceedings of the 2019 IEEE/ACM 41st International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP), Montreal, QC, Canada, 25–31 May 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 121–130. [Google Scholar]
  28. Qi, J.; Luan, Z.; Huang, S.; Fung, C.; Yang, H.; Li, H.; Zhu, D.; Qian, D. Logencoder: Log-based contrastive representation learning for anomaly detection. IEEE Trans. Netw. Serv. Manag. 2023, 20, 1378–1391. [Google Scholar] [CrossRef]
  29. Yager, R.R.; Liu, L. Classic Works of the Dempster-Shafer Theory of Belief Functions; Springer: Berlin/Heidelberg, Germany, 2008; Volume 219. [Google Scholar]
  30. Xu, W.; Huang, L.; Fox, A.; Patterson, D.; Jordan, M.I. Detecting large-scale system problems by mining console logs. In Proceedings of the ACM SIGOPS 22nd Symposium on Operating Systems Principles, Big Sky, MT, USA, 11–14 October 2009; pp. 117–132. [Google Scholar]
  31. Oliner, A.; Stearley, J. What supercomputers say: A study of five system logs. In Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN’07), Edinburgh, UK, 25–28 June 2007; IEEE: Piscataway, NJ, USA, 2007; pp. 575–584. [Google Scholar]
  32. Zhu, J.; He, S.; He, P.; Liu, J.; Lyu, M.R. Loghub: A large collection of system log datasets for ai-driven log analytics. In Proceedings of the 2023 IEEE 34th International Symposium on Software Reliability Engineering (ISSRE), Florence, Italy, 9–12 October 2023; IEEE: Piscataway, NJ, USA, 2023; pp. 355–366. [Google Scholar]
  33. Liu, F.T.; Ting, K.M.; Zhou, Z.H. Isolation Forest. In Proceedings of the Eighth IEEE International Conference on Data Mining, Pisa, Italy, 15–19 December 2008; pp. 413–422. [Google Scholar]
  34. Schölkopf, B.; Platt, J.C.; Shawe-Taylor, J.; Smola, A.J.; Williamson, R.C. Estimating the support of a high-dimensional distribution. Neural Comput. 2001, 13, 1443–1471. [Google Scholar] [CrossRef] [PubMed]
  35. Meng, W.; Liu, Y.; Zhu, Y.; Zhang, S.; Pei, D.; Liu, Y.; Chen, Y.; Zhang, R.; Tao, S.; Sun, P.; et al. Loganomaly: Unsupervised detection of sequential and quantitative anomalies in unstructured logs. In Proceedings of the International Joint Conference on Artificial Intelligence 2019, Macao, China, 10–16 August 2019; Volume 19, pp. 4739–4745. [Google Scholar]
  36. Kotz, S.; Nadarajah, S. Extreme Value Distributions: Theory and Applications; World Scientific: Singapore, 2000. [Google Scholar]
Figure 1. Open-world learning process.
Figure 1. Open-world learning process.
Applsci 14 07055 g001
Figure 2. Examples of preprocessing system log (HDFS dataset).
Figure 2. Examples of preprocessing system log (HDFS dataset).
Applsci 14 07055 g002
Figure 3. The framework of LogEDL.
Figure 3. The framework of LogEDL.
Applsci 14 07055 g003
Figure 4. ENN head.
Figure 4. ENN head.
Applsci 14 07055 g004
Figure 5. Examples of probability simplex.
Figure 5. Examples of probability simplex.
Applsci 14 07055 g005
Table 1. Statistics of evaluation datasets.
Table 1. Statistics of evaluation datasets.
DatasetLog MessagesNormalAnomaly
HDFS11,175,62910,887,339288,290
BGL4,747,9634,399,503348,460
Thunderbird20,000,0001,241,438758,562
Table 2. Preprocessing on HDFS, BGL, and Thunderbird datasets.
Table 2. Preprocessing on HDFS, BGL, and Thunderbird datasets.
DatasetLog
Sequences
Log KeysTrain DatasetTest DatasetAverage
Length
Normal Normal Anomaly
HDFS742,52747 (18)167,466558,22316,83819
BGL37,315334 (175)13,71820,5793018562
Thunderbird122,5401165 (866)46,29330,86245,385326
Table 3. Performance comparison of LogEDL and baseline methods.
Table 3. Performance comparison of LogEDL and baseline methods.
MethodHDFSBGLThunderbird
PrecisionRecallF1PrecisionRecallF1PrecisionRecallF1
PCA5.89100.0011.129.0798.2316.6137.35100.0054.39
iForest53.6069.4160.4999.7018.1130.6534.451.683.20
OCSVM2.54100.004.951.0612.241.9618.8939.1125.48
LogCluster99.2637.0853.9995.4664.0176.6398.2842.7859.61
DeepLog88.4469.4977.3489.7482.7886.1287.3499.6193.08
LogAnomaly94.1540.4756.1973.1276.0974.0886.7299.6392.73
LogBERT87.0278.1082.3289.4092.3290.8396.7596.5296.64
LogBERT (EVT)29.2469.0141.0728.1173.0540.6030.7874.2443.51
LogEDL (ours)90.0692.8091.4199.8497.2698.5397.8098.0897.91
Table 4. A comprehensive analysis of the computational efficiency of LogEDL (HDFS); all models tested with a sequence length of 512 and batch size of 1.
Table 4. A comprehensive analysis of the computational efficiency of LogEDL (HDFS); all models tested with a sequence length of 512 and batch size of 1.
MethodFlopsParametersTime (s)
PCA-- 2.6 × 10 6
iForest-- 2.3 × 10 6
OCSVM-- 1.2 × 10 2
LogCluster-- 3.2 × 10 5
DeepLog1.0 M0.1 M 3.8 × 10 4
LogAnomaly2.0 M0.1 M 1.3 × 10 3
LogBERT628.6 M2.1 M 3.7 × 10 3
LogEDL (ours)1076.8 M2.1 M 3.7 × 10 3
Table 5. Ablation experiments on different evidence loss functions.
Table 5. Ablation experiments on different evidence loss functions.
MethodHDFSBGLThunderbird
Precision Recall F1 Precision Recall F1 Precision Recall F1
LogBERT87.0278.1082.3289.4092.3290.8396.7596.5296.64
LogEDL (w. ENL)89.1484.5986.8197.4392.5494.9296.7096.9696.83
LogEDL (w. EMSE)89.9384.6287.1997.4692.3494.8396.9997.8097.39
LogEDL (w. ECE)90.0692.8091.4199.8497.2698.5397.8098.0897.91
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Duan, Y.; Xue, K.; Sun, H.; Bao, H.; Wei, Y.; You, Z.; Zhang, Y.; Jiang, X.; Yang, S.; Chen, J.; et al. LogEDL: Log Anomaly Detection via Evidential Deep Learning. Appl. Sci. 2024, 14, 7055. https://doi.org/10.3390/app14167055

AMA Style

Duan Y, Xue K, Sun H, Bao H, Wei Y, You Z, Zhang Y, Jiang X, Yang S, Chen J, et al. LogEDL: Log Anomaly Detection via Evidential Deep Learning. Applied Sciences. 2024; 14(16):7055. https://doi.org/10.3390/app14167055

Chicago/Turabian Style

Duan, Yunfeng, Kaiwen Xue, Hao Sun, Haotong Bao, Yadong Wei, Zhangzheng You, Yuantian Zhang, Xiwei Jiang, Sangning Yang, Jiaxing Chen, and et al. 2024. "LogEDL: Log Anomaly Detection via Evidential Deep Learning" Applied Sciences 14, no. 16: 7055. https://doi.org/10.3390/app14167055

APA Style

Duan, Y., Xue, K., Sun, H., Bao, H., Wei, Y., You, Z., Zhang, Y., Jiang, X., Yang, S., Chen, J., Duan, B., & Ou, Z. (2024). LogEDL: Log Anomaly Detection via Evidential Deep Learning. Applied Sciences, 14(16), 7055. https://doi.org/10.3390/app14167055

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop