{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T01:00:30Z","timestamp":1742950830139,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":36,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819772438"},{"type":"electronic","value":"9789819772445"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-7244-5_1","type":"book-chapter","created":{"date-parts":[[2024,8,27]],"date-time":"2024-08-27T17:02:38Z","timestamp":1724778158000},"page":"3-16","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["TWLog: Task Workflow-Based Log Anomaly Detection"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6365-0727","authenticated-orcid":false,"given":"Suqiong","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Dongyi","family":"Fan","sequence":"additional","affiliation":[]},{"given":"Lili","family":"He","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Deng","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,28]]},"reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Guo, H., Yuan, S., Wu, X.: Logbert: log anomaly detection via bert. In: International Joint Conference on Neural Networks (IJCNN), pp. 1\u20138. IEEE (2021)","DOI":"10.1109\/IJCNN52387.2021.9534113"},{"key":"1_CR2","unstructured":"Opentracing. https:\/\/opentracing.io\/"},{"key":"1_CR3","unstructured":"Lou, J.G., Fu, Q., Yang, S., Xu, Y., Li, J.: Mining invariants from console logs for system problem detection. In: USENIX Annual Technical Conference (USENIX ATC 2010), pp. 231\u2013244. (2010)"},{"issue":"2","key":"1_CR4","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1145\/2980024.2872407","volume":"44","author":"X Yu","year":"2016","unstructured":"Yu, X., Joshi, P., Xu, J., Jin, G., Zhang, H., Jiang, G.: Cloudseer: workflow monitoring of cloud infrastructures via interleaved logs. ACM SIGARCH Comput. Archit. News 44(2), 489\u2013502 (2016)","journal-title":"ACM SIGARCH Comput. Archit. News"},{"key":"1_CR5","unstructured":"Zhao, X., Rodrigues, K., Luo, Y., Yuan, D., Stumm, M.: Non-intrusive performance profiling for entire software stacks based on the flow reconstruction principle. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 2016), pp. 603\u2013618 (2016)"},{"key":"1_CR6","unstructured":"He, S., Zhu, J., He, P., Lyu, M. R.: Loghub: a large collection of system log datasets towards automated log analytics. arXiv preprint arXiv:2008.06448 (2020)"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Meng, W., Liu, Y., Zhu, Y., Zhang, S., Pei, D., Liu, Y.: Loganomaly: unsupervised detection of sequential and quantitative anomalies in unstructured logs. In: IJCAI, pp. 4739\u20134745 (2019)","DOI":"10.24963\/ijcai.2019\/658"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Wang, Z., Chen, Z., Ni, J., Liu, H., Chen, H., Tang, J.: Multi-scale one-class recurrent neural networks for discrete event sequence anomaly detection. In Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, pp. 3726\u20133734 (2021)","DOI":"10.1145\/3447548.3467125"},{"key":"1_CR9","unstructured":"Vaswani, A., Shazeer, N., Parmar, N., Uszkoreit, J., Jones, L., Gomez, A.N.: Attention is all you need. In: Advances in Neural Information Processing Systems, vol. 30 (2017)"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Meng, W., et al.: Loganomaly: unsupervised detection of sequential and quantitative anomalies in unstructured logs. In: IJCAI, vol. 19, no. 7, pp. 4739\u20134745 (2019)","DOI":"10.24963\/ijcai.2019\/658"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Zhang, X., Xu, Y., Lin, Q., Qiao, B., Zhang, H., Dang, Y.: Robust log-based anomaly detection on unstable log data. In: Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 807\u2013817 (2019)","DOI":"10.1145\/3338906.3338931"},{"key":"1_CR12","unstructured":"Wu, Y., et al.: Google\u2019s neural machine translation system: bridging the gap between human and machine translation. arXiv preprint arXiv:1609.08144 (2016)"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Chang, H.J., Yang, S.W., Lee, H.Y.: Distilhubert: speech representation learning by layer-wise distillation of hidden-unit bert. In: ICASSP 2022-2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 7087\u20137091 (2022)","DOI":"10.1109\/ICASSP43922.2022.9747490"},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Vervaet, A.: Monilog: an automated log-based anomaly detection system for cloud computing infrastructures. In: 2021 IEEE 37th International Conference on Data Engineering (ICDE), pp. 2739\u20132743 (2021)","DOI":"10.1109\/ICDE51399.2021.00317"},{"key":"1_CR15","unstructured":"Le, Q., Mikolov, T.: Distributed representations of sentences and documents. In: International Conference on Machine Learning, pp. 1188\u20131196 (2014)"},{"issue":"5","key":"1_CR16","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1016\/0306-4573(88)90021-0","volume":"24","author":"G Salton","year":"1988","unstructured":"Salton, G., Buckley, C.: Term-weighting approaches in automatic text retrieval. Inf. Process. Manag. 24(5), 513\u2013523 (1988)","journal-title":"Inf. Process. Manag."},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"Zhu, J., He, S., He, P., Liu, J., Lyu, M.R.: Loghub: a large collection of system log datasets for AI-driven log analytics. In: 2023 IEEE 34th International Symposium on Software Reliability Engineering (ISSRE), pp. 355\u2013366 (2023)","DOI":"10.1109\/ISSRE59848.2023.00071"},{"key":"1_CR18","unstructured":"Kubernetes. https:\/\/kubernetes.io\/docs\/home\/"},{"key":"1_CR19","unstructured":"Influxdb. https:\/\/docs.influxdata.com\/"},{"key":"1_CR20","unstructured":"Grafana. https:\/\/grafana.com\/docs\/grafana\/latest\/"},{"key":"1_CR21","unstructured":"Pometheus. https:\/\/prometheus.io\/docs\/introduction\/overview\/"},{"key":"1_CR22","doi-asserted-by":"crossref","unstructured":"Xu, W., Huang, L., Fox, A., Patterson, D., Jordan, M.I.: Detecting large-scale system problems by mining console logs. In: Proceedings of the ACM SIGOPS 22nd Symposium on Operating Systems Principles, pp. 117\u2013132 (2009)","DOI":"10.1145\/1629575.1629587"},{"key":"1_CR23","doi-asserted-by":"crossref","unstructured":"He, S., Zhu, J., He, P., Lyu, M.R.: Experience report: system log analysis for anomaly detection. In: 2016 IEEE 27th International Symposium on Software Reliability Engineering (ISSRE), pp. 207\u2013218 (2016)","DOI":"10.1109\/ISSRE.2016.21"},{"key":"1_CR24","unstructured":"Wang, Y., Wong, J., Miner, A.: Anomaly intrusion detection using one class SVM. In: Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, pp. 358\u2013364 (2004)"},{"key":"1_CR25","doi-asserted-by":"crossref","unstructured":"Du, M., Li, F., Zheng, G., Srikumar, V.: Deeplog: anomaly detection and diagnosis from system logs through deep learning. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 1285\u20131298 (2017)","DOI":"10.1145\/3133956.3134015"},{"key":"1_CR26","doi-asserted-by":"crossref","unstructured":"Zhang, C., et al.: Deeptralog: trace-log combined microservice anomaly detection through graph-based deep learning. In: Proceedings of the 44th International Conference on Software Engineering, pp. 623\u2013634 (2022)","DOI":"10.1145\/3510003.3510180"},{"key":"1_CR27","doi-asserted-by":"crossref","unstructured":"He, P., Zhu, J., Zheng, Z., Lyu, M.R.: Drain: an online log parsing approach with fixed depth tree. In: 2017 IEEE International Conference on Web Services (ICWS), pp. 33\u201340 (2017)","DOI":"10.1109\/ICWS.2017.13"},{"key":"1_CR28","doi-asserted-by":"crossref","unstructured":"Du, M., Li, F.: Spell: streaming parsing of system event logs. In: 2016 IEEE 16th International Conference on Data Mining (ICDM), pp. 859\u2013864 (2016)","DOI":"10.1109\/ICDM.2016.0103"},{"key":"1_CR29","doi-asserted-by":"crossref","unstructured":"Xu, W., Huang, L., Fox, A., Patterson, D., Jordan, M.: Largescale system problem detection by mining console logs. In: Proceedings of SOSP 2009 (2019)","DOI":"10.1109\/ICDM.2009.19"},{"key":"1_CR30","doi-asserted-by":"crossref","unstructured":"Lin, Q., Zhang, H., Lou, J.G., Zhang, Y., Chen, X.: Log clustering based problem identification for online service systems. In: Proceedings of the 38th International Conference on Software Engineering Companion, pp. 102\u2013111 (2016)","DOI":"10.1145\/2889160.2889232"},{"key":"1_CR31","doi-asserted-by":"crossref","unstructured":"He, S., Lin, Q., Lou, J.G., Zhang, H., Lyu, M.R., Zhang, D.: Identifying impactful service system problems via log analysis. In: Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 60\u201370 (2018)","DOI":"10.1145\/3236024.3236083"},{"key":"1_CR32","doi-asserted-by":"crossref","unstructured":"Zhang, K., Xu, J., Min, M.R., Jiang, G., Pelechrinis, K., Zhang, H.: Automated IT system failure prediction: a deep learning approach. In: 2016 IEEE International Conference on Big Data (Big Data), pp. 1291\u20131300 (2016)","DOI":"10.1109\/BigData.2016.7840733"},{"key":"1_CR33","doi-asserted-by":"crossref","unstructured":"Zhang, X., et al.: Robust log-based anomaly detection on unstable log data. In: Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 807\u2013817 (2019)","DOI":"10.1145\/3338906.3338931"},{"key":"1_CR34","doi-asserted-by":"crossref","unstructured":"Liu, F., Wen, Y., Zhang, D., Jiang, X., Xing, X., Meng, D.: Log2vec: a heterogeneous graph embedding based approach for detecting cyber threats within enterprise. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp. 1777\u20131794 (2019)","DOI":"10.1145\/3319535.3363224"},{"key":"1_CR35","unstructured":"Guo, X., et al.: Graph-based trace analysis for microservice architecture understanding and problem diagnosis. In: Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 1387\u20131397 (2016)"},{"key":"1_CR36","doi-asserted-by":"crossref","unstructured":"Liu, P., et al.: Unsupervised detection of microservice trace anomalies through service-level deep Bayesian networks. In: 2020 IEEE 31st International Symposium on Software Reliability Engineering (ISSRE), pp. 48\u201358 (2020)","DOI":"10.1109\/ISSRE5003.2020.00014"}],"container-title":["Lecture Notes in Computer Science","Web and Big Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-7244-5_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,27]],"date-time":"2024-08-27T17:04:09Z","timestamp":1724778249000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-7244-5_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819772438","9789819772445"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-7244-5_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"28 August 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"APWeb-WAIM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Asia-Pacific Web (APWeb) and Web-Age Information Management (WAIM) Joint International Conference on Web and Big Data","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Jinhua","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 August 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"apwebwaim2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/apweb2024.zjnu.edu.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}