{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:24:20Z","timestamp":1761402260331,"version":"3.40.3"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031163012"},{"type":"electronic","value":"9783031163029"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-16302-9_3","type":"book-chapter","created":{"date-parts":[[2022,10,5]],"date-time":"2022-10-05T23:03:52Z","timestamp":1665011032000},"page":"33-42","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Real-Time Anomaly Detection for\u00a0Distributed Systems Logs Using Apache Kafka and\u00a0H2O.ai"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6705-3500","authenticated-orcid":false,"given":"K\u0119stutis","family":"Daug\u0117la","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4769-4527","authenticated-orcid":false,"given":"Evaldas","family":"Vai\u010diukynas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,6]]},"reference":[{"key":"3_CR1","doi-asserted-by":"publisher","first-page":"06","DOI":"10.1016\/j.neucom.2017.04.070","volume":"262","author":"S Ahmad","year":"2017","unstructured":"Ahmad, S., Lavin, A., Purdy, S., Agha, Z.: Unsupervised real-time anomaly detection for streaming data. Neurocomputing 262, 06 (2017)","journal-title":"Neurocomputing"},{"key":"3_CR2","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/j.jpdc.2014.08.007","volume":"79","author":"M Andreolini","year":"2015","unstructured":"Andreolini, M., Colajanni, M., Pietri, M., Tosi, S.: Adaptive, scalable and reliable monitoring of big data on clouds. J. Parallel Distrib. Comput. 79, 67\u201379 (2015). Special Issue on Scalable Systems for Big Data Management and Analytics","journal-title":"J. Parallel Distrib. Comput."},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Chong, F., Chua, T., Lim, E.P., Huberman, B.A.: Detecting flow anomalies in distributed systems. In: 2014 IEEE International Conference on Data Mining. IEEE (2014)","DOI":"10.1109\/ICDM.2014.94"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Chong, F., Chua, T., Lim, E.P., Huberman, B.A.: Detecting flow anomalies in distributed systems. In: Proceedings of the 2014 IEEE International Conference on Data Mining, ICDM 2014, pp. 100\u2013109, USA. IEEE Computer Society (2014)","DOI":"10.1109\/ICDM.2014.94"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Decker, L., Leite, D., Giommi, L., Bonacorsi, D.: Real-time anomaly detection in data centers for log-based predictive maintenance using an evolving fuzzy-rule-based approach. In: 2020 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE). IEEE (2020)","DOI":"10.1109\/FUZZ48607.2020.9177762"},{"key":"3_CR6","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1016\/j.trpro.2020.10.012","volume":"50","author":"A Dorofeev","year":"2020","unstructured":"Dorofeev, A., Kurganov, V., Fillipova, N., Pashkova, T.: Ensuring the integrity of transportation and logistics during the COVID-19 pandemic. Transp. Res. Procedia 50, 96\u2013105 (2020). XIV International Conference on Organization and Traffic Safety Management in Large Cities (OTS-2020)","journal-title":"Transp. Res. Procedia"},{"issue":"3","key":"3_CR7","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1016\/j.icte.2020.06.003","volume":"6","author":"A Farzad","year":"2020","unstructured":"Farzad, A., Gulliver, T.A.: Unsupervised log message anomaly detection. ICT Express 6(3), 229\u2013237 (2020)","journal-title":"ICT Express"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Fu, Q., Lou, J.G., Wang, Y., Li, J.: Execution anomaly detection in distributed systems through unstructured log analysis. In: 2009 Ninth IEEE International Conference on Data Mining. IEEE (2009)","DOI":"10.1109\/ICDM.2009.60"},{"issue":"24","key":"3_CR9","first-page":"8","volume":"182","author":"G Poojitha","year":"2018","unstructured":"Poojitha, G., Sowmyarani, C.: Pipeline for real-time anomaly detection in log data streams using Apache Kafka and Apache Spark. Int. J. Comput. Appl. 182(24), 8\u201313 (2018)","journal-title":"Int. J. Comput. Appl."},{"key":"3_CR10","unstructured":"H2O.ai. H2O: Scalable Machine Learning Platform, 2020. version 3.30.0.6"},{"key":"3_CR11","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1016\/j.ijinfomgt.2018.08.006","volume":"45","author":"RAA Habeeb","year":"2019","unstructured":"Habeeb, R.A.A., Nasaruddin, F., Gani, A., Hashem, I.A.T., Ahmed, E., Imran, M.: Real-time big data processing for anomaly detection: a survey. Int. J. Inf. Manage. 45, 289\u2013307 (2019)","journal-title":"Int. J. Inf. Manage."},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"He, S., Zhu, J., He, P., Lyu, M.R.: Experience report: system log analysis for anomaly detection. In: 2016 IEEE 27th International Symposium on Software Reliability Engineering (ISSRE), pp. 207\u2013218 (2016)","DOI":"10.1109\/ISSRE.2016.21"},{"key":"3_CR13","unstructured":"He, S., Zhu, J., He, P., Lyu, M.R.: Loghub: a large collection of system log datasets towards automated log analytics. ArXiv, abs\/2008.06448, 2020"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Hesse, G., Matthies, C., Rabl, T., Uflacker, M.: How fast can we insert? a performance study of apache kafka. ArXiv, abs\/2003.06452 (2020)","DOI":"10.1109\/ICPADS51040.2020.00089"},{"key":"3_CR15","unstructured":"Jafarpour, H., Desai, R.: KSQL: streaming SQL engine for Apache Kafka. In: Herschel, M., Galhardas, H., Reinwald, B., Fundulaki, I., Binnig, C., Kaoudi, Z. (eds.) Advances in Database Technology - 22nd International Conference on Extending Database Technology, EDBT 2019, Lisbon, Portugal, 26\u201329 March 2019, pp. 524\u2013533. OpenProceedings.org (2019)"},{"key":"3_CR16","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/978-3-319-70581-1_17","volume-title":"Advances in Intelligent Systems and Computing II","author":"Y Kochura","year":"2018","unstructured":"Kochura, Y., Stirenko, S., Alienin, O., Novotarskiy, M., Gordienko, Y.: Performance analysis of open source machine learning frameworks for various parameters in single-threaded and multi-threaded modes. In: Shakhovska, N., Stepashko, V. (eds.) CSIT 2017. AISC, vol. 689, pp. 243\u2013256. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-70581-1_17"},{"key":"3_CR17","unstructured":"Kreps, J., Kafka : a distributed messaging system for log processing (2011)"},{"issue":"6","key":"3_CR18","doi-asserted-by":"publisher","first-page":"790","DOI":"10.1016\/j.jpdc.2013.02.004","volume":"73","author":"H Kumarage","year":"2013","unstructured":"Kumarage, H., Khalil, I., Tari, Z., Zomaya, A.: Distributed anomaly detection for industrial wireless sensor networks based on fuzzy data modelling. J. Parallel Distrib. Comput. 73(6), 790\u2013806 (2013)","journal-title":"J. Parallel Distrib. Comput."},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Kumari, R., Singh, M.K., Jha, R., Singh, N.K.: Anomaly detection in network traffic using k-mean clustering. In: 2016 3rd International Conference on Recent Advances in Information Technology (RAIT), pp. 387\u2013393 (2016)","DOI":"10.1109\/RAIT.2016.7507933"},{"issue":"6","key":"3_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3359981","volume":"52","author":"L Leite","year":"2019","unstructured":"Leite, L., Rocha, C., Kon, F., Milojicic, D., Meirelles, P.: A survey of DevOps concepts and challenges. ACM Comput. Surv. 52(6), 1\u201335 (2019)","journal-title":"ACM Comput. Surv."},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"Liu, F.T., Ting, K.M., Zhou, Z.H.: Isolation forest. In: 2008 Eighth IEEE International Conference on Data Mining. IEEE (2008)","DOI":"10.1109\/ICDM.2008.17"},{"issue":"1","key":"3_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2133360.2133363","volume":"6","author":"FT Liu","year":"2012","unstructured":"Liu, F.T., Ting, K.M., Zhou, Z.H.: Isolation-based anomaly detection. ACM Trans. Knowl. Discov. Data 6(1), 1\u201339 (2012)","journal-title":"ACM Trans. Knowl. Discov. Data"},{"key":"3_CR23","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1016\/j.cose.2018.06.002","volume":"78","author":"D Myers","year":"2018","unstructured":"Myers, D., Suriadi, S., Radke, K., Foo, E.: Anomaly detection for industrial control systems using process mining. Comput. Secur. 78, 103\u2013125 (2018)","journal-title":"Comput. Secur."},{"key":"3_CR24","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1007\/978-3-030-30149-1_24","volume-title":"Industrial Networks and Intelligent Systems","author":"T-B-T Nguyen","year":"2019","unstructured":"Nguyen, T.-B.-T., Liao, T.-L., Vu, T.-A.: Anomaly detection using one-class SVM for logs of juniper router devices. In: Duong, T.Q., Vo, N.-S., Nguyen, L.K., Vien, Q.-T., Nguyen, V.-D. (eds.) INISCOM 2019. LNICST, vol. 293, pp. 302\u2013312. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-30149-1_24"},{"key":"3_CR25","doi-asserted-by":"crossref","unstructured":"Nixon, C., Sedky, M., Hassan, M. .: Autoencoders: a low cost anomaly detection method for computer network data streams. In: Proceedings of the 2020 4th International Conference on Cloud and Big Data Computing, ICCBDC 2020, pp. 58\u201362, New York, NY, USA. Association for Computing Machinery (2020)","DOI":"10.1145\/3416921.3416937"},{"key":"3_CR26","unstructured":"Pang, G., Shen, C., Cao, L., Hengel, A.V.D.: Deep learning for anomaly detection: a review. CoRR, abs\/2007.02500 (2020)"},{"issue":"6","key":"3_CR27","doi-asserted-by":"publisher","first-page":"7003","DOI":"10.1016\/j.eswa.2010.12.014","volume":"38","author":"J Rabatel","year":"2011","unstructured":"Rabatel, J., Bringay, S., Poncelet, P.: Anomaly detection in monitoring sensor data for preventive maintenance. Expert Syst. Appl. 38(6), 7003\u20137015 (2011)","journal-title":"Expert Syst. Appl."},{"issue":"3","key":"3_CR28","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0118432","volume":"10","author":"T Saito","year":"2015","unstructured":"Saito, T., Rehmsmeier, M.: The precision-recall plot is more informative than the ROC plot when evaluating binary classifiers on imbalanced datasets. PLoS ONE 10(3), e0118432 (2015)","journal-title":"PLoS ONE"},{"key":"3_CR29","doi-asserted-by":"crossref","unstructured":"Sax, M.J.: Apache Kafka, pp. 1\u20138. Springer International Publishing, Cham (2018)","DOI":"10.1007\/978-3-319-63962-8_196-1"},{"key":"3_CR30","doi-asserted-by":"crossref","unstructured":"Sax, M.J., Wang, G., Weidlich, M., Freytag, J.C.: Streams and tables: two sides of the same coin. In: Proceedings of the International Workshop on Real-Time Business Intelligence and Analytics, BIRTE 2018, New York, NY, USA. Association for Computing Machinery (2018)","DOI":"10.1145\/3242153.3242155"},{"key":"3_CR31","doi-asserted-by":"crossref","unstructured":"Xu, H., et al.: Unsupervised anomaly detection via variational auto-encoder for seasonal KPIs in web applications. In: Proceedings of the 2018 World Wide Web Conference on World Wide Web, pp. 187\u2013196. International World Wide Web Conferences Steering Committee (2018)","DOI":"10.1145\/3178876.3185996"},{"key":"3_CR32","doi-asserted-by":"crossref","unstructured":"Zasadzi\u0144ski, M., Sol\u00e9, M., Brandon, A., Munt\u00e9s-Mulero, V., Carrera, D.: Next stop \u201cNoOps\u201d: enabling cross-system diagnostics through graph-based composition of logs and metrics. In: 2018 IEEE International Conference on Cluster Computing (CLUSTER), pp. 212\u2013222 (2018)","DOI":"10.1109\/CLUSTER.2018.00039"},{"key":"3_CR33","doi-asserted-by":"crossref","unstructured":"Zhang, X., et al.: Robust log-based anomaly detection on unstable log data. In: Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, ESEC\/FSE 2019, pp. 807\u2013817, New York, NY, USA. Association for Computing Machinery (2019)","DOI":"10.1145\/3338906.3338931"}],"container-title":["Communications in Computer and Information Science","Information and Software Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-16302-9_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,5]],"date-time":"2022-10-05T23:23:31Z","timestamp":1665012211000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-16302-9_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031163012","9783031163029"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-16302-9_3","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"6 October 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICIST","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information and Software Technologies","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kaunas","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lithuania","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 October 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 October 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icist2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icist.ktu.edu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"66","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"35% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}