{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T14:40:18Z","timestamp":1773412818053,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,3,28]],"date-time":"2022-03-28T00:00:00Z","timestamp":1648425600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,3,28]]},"DOI":"10.1145\/3492321.3519566","type":"proceedings-article","created":{"date-parts":[[2022,3,28]],"date-time":"2022-03-28T14:28:18Z","timestamp":1648477698000},"page":"236-250","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Hybrid anomaly detection and prioritization for network logs at cloud scale"],"prefix":"10.1145","author":[{"given":"David","family":"Ohana","sequence":"first","affiliation":[{"name":"IBM Research, Haifa, Israel"}]},{"given":"Bruno","family":"Wassermann","sequence":"additional","affiliation":[{"name":"IBM Research, Haifa, Israel"}]},{"given":"Nicolas","family":"Dupuis","sequence":"additional","affiliation":[{"name":"IBM Research"}]},{"given":"Elliot","family":"Kolodner","sequence":"additional","affiliation":[{"name":"IBM Research, Haifa, Israel"}]},{"given":"Eran","family":"Raichstein","sequence":"additional","affiliation":[{"name":"IBM Research, Haifa, Israel"}]},{"given":"Michal","family":"Malka","sequence":"additional","affiliation":[{"name":"IBM Research, Haifa, Israel"}]}],"member":"320","published-online":{"date-parts":[[2022,3,28]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2017.04.070"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2959739"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1136\/bmj.331.7521.903"},{"key":"e_1_3_2_1_4_1","volume-title":"Unsupervised Labeling for Supervised Anomaly Detection in Enterprise and Cloud Networks. 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud)","author":"Baek S.","year":"2017","unstructured":"S. Baek , Donghwoon Kwon , Jinoh Kim , S. Suh , Hyunjoo Kim , and Ikkyun Kim . 2017 . Unsupervised Labeling for Supervised Anomaly Detection in Enterprise and Cloud Networks. 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud) (2017), 205--210. S. Baek, Donghwoon Kwon, Jinoh Kim, S. Suh, Hyunjoo Kim, and Ikkyun Kim. 2017. Unsupervised Labeling for Supervised Anomaly Detection in Enterprise and Cloud Networks. 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud) (2017), 205--210."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1115\/1.4026639"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/335191.335388"},{"key":"e_1_3_2_1_8_1","unstructured":"Courtney Cochrane. 2018. Time Series Nested Cross-Validation. https:\/\/towardsdatascience.com\/time-series-nested-cross-validation-76adba623eb9 Courtney Cochrane. 2018. Time Series Nested Cross-Validation. https:\/\/towardsdatascience.com\/time-series-nested-cross-validation-76adba623eb9"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134015"},{"key":"e_1_3_2_1_10_1","volume-title":"Incremental calculation of weighted mean and variance. (01","author":"Finch Tony","year":"2009","unstructured":"Tony Finch . 2009. Incremental calculation of weighted mean and variance. (01 2009 ). Tony Finch. 2009. Incremental calculation of weighted mean and variance. (01 2009)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2012.6263932"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC5424"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787496"},{"key":"e_1_3_2_1_14_1","volume-title":"Schormans","author":"Hasib Maheen","year":"2003","unstructured":"Maheen Hasib and John A . Schormans . 2003 . LIMITATIONS OF PASSIVE & ACTIVE MEASUREMENT METHODS IN PACKET NETWORKS. Maheen Hasib and John A. Schormans. 2003. LIMITATIONS OF PASSIVE & ACTIVE MEASUREMENT METHODS IN PACKET NETWORKS."},{"key":"e_1_3_2_1_15_1","volume-title":"Drain: An Online Log Parsing Approach with Fixed Depth Tree. 2017 IEEE International Conference on Web Services (ICWS)","author":"He Pinjia","year":"2017","unstructured":"Pinjia He , Jieming Zhu , Zibin Zheng , and Michael R. Lyu . 2017 . Drain: An Online Log Parsing Approach with Fixed Depth Tree. 2017 IEEE International Conference on Web Services (ICWS) ( 2017 ), 33--40. Pinjia He, Jieming Zhu, Zibin Zheng, and Michael R. Lyu. 2017. Drain: An Online Log Parsing Approach with Fixed Depth Tree. 2017 IEEE International Conference on Web Services (ICWS) (2017), 33--40."},{"key":"e_1_3_2_1_16_1","unstructured":"J. Higgins. 1993. Classification and approximation with rule-based networks. J. Higgins. 1993. Classification and approximation with rule-based networks."},{"key":"e_1_3_2_1_17_1","volume-title":"Johnson","author":"Horn Roger A.","year":"1985","unstructured":"Roger A. Horn and Charles R . Johnson . 1985 . Norms for vectors and matrices. Roger A. Horn and Charles R. Johnson. 1985. Norms for vectors and matrices."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijforecast.2006.03.001"},{"key":"e_1_3_2_1_19_1","volume-title":"Principal component analysis","author":"Jolliffe Ian","unstructured":"Ian Jolliffe . 2002. Principal component analysis . Springer Verlag , New York . Ian Jolliffe. 2002. Principal component analysis. Springer Verlag, New York."},{"key":"e_1_3_2_1_20_1","volume-title":"Convolutional Neural Networks for Sentence Classification. CoRR abs\/1408.5882","author":"Kim Yoon","year":"2014","unstructured":"Yoon Kim . 2014. Convolutional Neural Networks for Sentence Classification. CoRR abs\/1408.5882 ( 2014 ). arXiv:1408.5882 http:\/\/arxiv.org\/abs\/1408.5882 Yoon Kim. 2014. Convolutional Neural Networks for Sentence Classification. CoRR abs\/1408.5882 (2014). arXiv:1408.5882 http:\/\/arxiv.org\/abs\/1408.5882"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2788611"},{"key":"e_1_3_2_1_22_1","volume-title":"Log Clustering Based Problem Identification for Online Service Systems. 2016 IEEE\/ACM 38th International Conference on Software Engineering Companion (ICSE-C)","author":"Lin Qingwei","year":"2016","unstructured":"Qingwei Lin , Hongyu Zhang , Jian-Guang Lou , Y. Zhang , and Xuewei Chen . 2016 . Log Clustering Based Problem Identification for Online Service Systems. 2016 IEEE\/ACM 38th International Conference on Software Engineering Companion (ICSE-C) (2016), 102--111. Qingwei Lin, Hongyu Zhang, Jian-Guang Lou, Y. Zhang, and Xuewei Chen. 2016. Log Clustering Based Problem Identification for Online Service Systems. 2016 IEEE\/ACM 38th International Conference on Software Engineering Companion (ICSE-C) (2016), 102--111."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2889160.2889232"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815679"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.17"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Han Liu. 2015. Rule based systems for classification in machine learning context. Han Liu. 2015. Rule based systems for classification in machine learning context.","DOI":"10.1007\/978-3-319-46562-3_9"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/IS.2016.7737440"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3055425"},{"key":"e_1_3_2_1_29_1","unstructured":"Tomas Mikolov Ilya Sutskever Kai Chen Greg Corrado and Jeffrey Dean. 2013. Distributed Representations of Words and Phrases and their Compositionality. In Neural and Information Processing System (NIPS). Tomas Mikolov Ilya Sutskever Kai Chen Greg Corrado and Jeffrey Dean. 2013. Distributed Representations of Words and Phrases and their Compositionality. In Neural and Information Processing System (NIPS)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2788624"},{"key":"e_1_3_2_1_31_1","unstructured":"David Ohana and Moshik Hershcovitch. 2020. IBM\/Drain3: Drain LOG TEMPLATE miner in Python3. https:\/\/github.com\/IBM\/Drain3 David Ohana and Moshik Hershcovitch. 2020. IBM\/Drain3: Drain LOG TEMPLATE miner in Python3. https:\/\/github.com\/IBM\/Drain3"},{"key":"e_1_3_2_1_32_1","volume-title":"Anna Veronika Dorogush, and A. Gulin","author":"Ostroumova L.","year":"2018","unstructured":"L. Ostroumova , Gleb Gusev , A. Vorobev , Anna Veronika Dorogush, and A. Gulin . 2018 . CatBoost: unbiased boosting with categorical features. In NeurIPS. L. Ostroumova, Gleb Gusev, A. Vorobev, Anna Veronika Dorogush, and A. Gulin. 2018. CatBoost: unbiased boosting with categorical features. In NeurIPS."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2078195"},{"key":"e_1_3_2_1_34_1","volume-title":"Evaluation: from precision, recall and F-measure to ROC, informedness, markedness and correlation. ArXiv abs\/2010.16061","author":"Powers D.","year":"2020","unstructured":"D. Powers . 2020. Evaluation: from precision, recall and F-measure to ROC, informedness, markedness and correlation. ArXiv abs\/2010.16061 ( 2020 ). D. Powers. 2020. Evaluation: from precision, recall and F-measure to ROC, informedness, markedness and correlation. ArXiv abs\/2010.16061 (2020)."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1080\/00031305.1994.10476030","article-title":"The Three Sigma Rule","volume":"48","author":"Pukelsheim Friedrich","year":"1994","unstructured":"Friedrich Pukelsheim . 1994 . The Three Sigma Rule . The American Statistician 48 , 2 (1994), 88 -- 91 . http:\/\/www.jstor.org\/stable\/2684253 Friedrich Pukelsheim. 1994. The Three Sigma Rule. The American Statistician 48, 2 (1994), 88--91. http:\/\/www.jstor.org\/stable\/2684253","journal-title":"The American Statistician"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330680"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1162\/089976601750264965"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486842"},{"key":"e_1_3_2_1_39_1","volume-title":"Edwards","author":"Shipmon Dominique T.","year":"2017","unstructured":"Dominique T. Shipmon , Jason M. Gurevitch , Paolo Piselli , and Stephen T . Edwards . 2017 . Time Series Anomaly Detection; Detection of anomalous drops with limited features and sparse examples in noisy highly periodic data. ArXiv abs\/1708.03665 (2017). Dominique T. Shipmon, Jason M. Gurevitch, Paolo Piselli, and Stephen T. Edwards. 2017. Time Series Anomaly Detection; Detection of anomalous drops with limited features and sparse examples in noisy highly periodic data. ArXiv abs\/1708.03665 (2017)."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-2070(00)00065-0"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.2307\/3617085"},{"key":"e_1_3_2_1_42_1","volume-title":"Scalable Rule-Based Representation Learning for Interpretable Classification. ArXiv abs\/2109.15103","author":"Wang Zhuo","year":"2021","unstructured":"Zhuo Wang , Wei Zhang , Ning Liu , and Jianyong Wang . 2021. Scalable Rule-Based Representation Learning for Interpretable Classification. ArXiv abs\/2109.15103 ( 2021 ). Zhuo Wang, Wei Zhang, Ning Liu, and Jianyong Wang. 2021. Scalable Rule-Based Representation Learning for Interpretable Classification. ArXiv abs\/2109.15103 (2021)."},{"key":"e_1_3_2_1_43_1","unstructured":"Bruno Wassermann David Ohana Ronen Schaffer Robert Shahla Elliot K. Kolodner Eran Raichstein and Michal Malka. 2022. DeCorus: Hierarchical Multivariate Anomaly Detection at Cloud-Scale. arXiv:2202.06892 [cs.LG] Bruno Wassermann David Ohana Ronen Schaffer Robert Shahla Elliot K. Kolodner Eran Raichstein and Michal Malka. 2022. DeCorus: Hierarchical Multivariate Anomaly Detection at Cloud-Scale. arXiv:2202.06892 [cs.LG]"},{"key":"e_1_3_2_1_44_1","volume-title":"SOSP '09","author":"Xu W.","unstructured":"W. Xu , Ling Huang , A. Fox , D. Patterson , and Michael I. Jordan . 2009. Detecting large-scale system problems by mining console logs . In SOSP '09 . W. Xu, Ling Huang, A. Fox, D. Patterson, and Michael I. Jordan. 2009. Detecting large-scale system problems by mining console logs. In SOSP '09."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"crossref","unstructured":"Shenglin Zhang Y. Liu Weibin Meng Zhiling Luo Jiahao Bu Sen Yang Peixian Liang Dan Pei Jun Xu Yuzhi Zhang Y. Chen Hui Dong Xianping Qu and Lei Song. 2019. PreFix: Switch Failure Prediction in Datacenter Networks. In PERV. Shenglin Zhang Y. Liu Weibin Meng Zhiling Luo Jiahao Bu Sen Yang Peixian Liang Dan Pei Jun Xu Yuzhi Zhang Y. Chen Hui Dong Xianping Qu and Lei Song. 2019. PreFix: Switch Failure Prediction in Datacenter Networks. In PERV.","DOI":"10.1145\/3219617.3219643"},{"key":"e_1_3_2_1_46_1","volume-title":"Cross-dataset Time Series Anomaly Detection for Cloud Systems. In USENIX Annual Technical Conference.","author":"Zhang Xu","year":"2019","unstructured":"Xu Zhang , Qingwei Lin , Yong Xu , Si Qin , Hongyu Zhang , Bo Qiao , Yingnong Dang , Xinsheng Yang , Qian Cheng , Murali Chintalapati , Youjiang Wu , Ken Hsieh , Kaixin Sui , Xin Meng , Yaohai Xu , Wenchi Zhang , S. Furao , and Dongmei Zhang . 2019 . Cross-dataset Time Series Anomaly Detection for Cloud Systems. In USENIX Annual Technical Conference. Xu Zhang, Qingwei Lin, Yong Xu, Si Qin, Hongyu Zhang, Bo Qiao, Yingnong Dang, Xinsheng Yang, Qian Cheng, Murali Chintalapati, Youjiang Wu, Ken Hsieh, Kaixin Sui, Xin Meng, Yaohai Xu, Wenchi Zhang, S. Furao, and Dongmei Zhang. 2019. Cross-dataset Time Series Anomaly Detection for Cloud Systems. In USENIX Annual Technical Conference."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"crossref","unstructured":"Deqing Zou Hao Qin Hai Jin Weizhong Qiang Zongfen Han and X. Chen. 2014. Improving Log-Based Fault Diagnosis by Log Classification. In NPC. Deqing Zou Hao Qin Hai Jin Weizhong Qiang Zongfen Han and X. Chen. 2014. Improving Log-Based Fault Diagnosis by Log Classification. In NPC.","DOI":"10.1007\/978-3-662-44917-2_37"}],"event":{"name":"EuroSys '22: Seventeenth European Conference on Computer Systems","location":"Rennes France","acronym":"EuroSys '22","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the Seventeenth European Conference on Computer Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3492321.3519566","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3492321.3519566","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:31:07Z","timestamp":1750188667000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3492321.3519566"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,28]]},"references-count":47,"alternative-id":["10.1145\/3492321.3519566","10.1145\/3492321"],"URL":"https:\/\/doi.org\/10.1145\/3492321.3519566","relation":{},"subject":[],"published":{"date-parts":[[2022,3,28]]},"assertion":[{"value":"2022-03-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}