IDEAS home Printed from https://ideas.repec.org/a/spr/infosf/v23y2021i2d10.1007_s10796-020-10026-3.html
   My bibliography  Save this article

LogGAN: a Log-level Generative Adversarial Network for Anomaly Detection using Permutation Event Modeling

Author

Listed:
  • Bin Xia

    (Nanjing University of Posts and Telecommunications)

  • Yuxuan Bai

    (Nanjing University of Posts and Telecommunications)

  • Junjie Yin

    (Nanjing University of Posts and Telecommunications)

  • Yun Li

    (Nanjing University of Posts and Telecommunications)

  • Jian Xu

    (Nanjing University of Science and Technology)

Abstract

System logs that trace system states and record valuable events comprise a significant component of any computer system in our daily life. Each log contains sufficient information (i.e., normal and abnormal instances) that assist administrators in diagnosing and maintaining the operation of systems. If administrators cannot detect and eliminate diverse and complex anomalies (i.e., bugs and failures) efficiently, running workflows and transactions, even systems, would break down. Therefore, the technique of anomaly detection has become increasingly significant and attracted a lot of research attention. However, current approaches concentrate on the anomaly detection analyzing a high-level granularity of logs (i.e., session) instead of detecting log-level anomalies which weakens the efficiency of responding anomalies and the diagnosis of system failures. To overcome the limitation, we propose an LSTM-based generative adversarial network for anomaly detection based on system logs using permutation event modeling named LogGAN, which detects log-level anomalies based on patterns (i.e., combinations of latest logs). On the one hand, the permutation event modeling mitigates the strong sequential characteristics of LSTM for solving the out-of-order problem caused by the arrival delays of logs. On the other hand, the generative adversarial network-based model mitigates the impact of imbalance between normal and abnormal instances to improve the performance of detecting anomalies. To evaluate LogGAN, we conduct extensive experiments on two real-world datasets, and the experimental results show the effectiveness of our proposed approach on the task of log-level anomaly detection.

Suggested Citation

  • Bin Xia & Yuxuan Bai & Junjie Yin & Yun Li & Jian Xu, 2021. "LogGAN: a Log-level Generative Adversarial Network for Anomaly Detection using Permutation Event Modeling," Information Systems Frontiers, Springer, vol. 23(2), pages 285-298, April.
  • Handle: RePEc:spr:infosf:v:23:y:2021:i:2:d:10.1007_s10796-020-10026-3
    DOI: 10.1007/s10796-020-10026-3
    as

    Download full text from publisher

    File URL: http://link.springer.com/10.1007/s10796-020-10026-3
    File Function: Abstract
    Download Restriction: Access to the full text of the articles in this series is restricted.

    File URL: https://libkey.io/10.1007/s10796-020-10026-3?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Tamal Mondal & Prithviraj Pramanik & Indrajit Bhattacharya & Naiwrita Boral & Saptarshi Ghosh, 2018. "Analysis and Early Detection of Rumors in a Post Disaster Scenario," Information Systems Frontiers, Springer, vol. 20(5), pages 961-979, October.
    2. Abir Troudi & Corinne Amel Zayani & Salma Jamoussi & Ikram Amous Ben Amor, 2018. "A New Mashup Based Method for Event Detection from Social Media," Information Systems Frontiers, Springer, vol. 20(5), pages 981-992, October.
    3. Shaio Yan Huang & Chi-Chen Lin & An-An Chiu & David C. Yen, 2017. "Fraud detection using fraud triangle risk factors," Information Systems Frontiers, Springer, vol. 19(6), pages 1343-1356, December.
    4. Shaio Yan Huang & Chi-Chen Lin & An-An Chiu & David C. Yen, 0. "Fraud detection using fraud triangle risk factors," Information Systems Frontiers, Springer, vol. 0, pages 1-14.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Shouhuai Xu & Moti Yung & Jingguo Wang, 2021. "Seeking Foundations for the Science of Cyber Security," Information Systems Frontiers, Springer, vol. 23(2), pages 263-267, April.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Bin Xia & Yuxuan Bai & Junjie Yin & Yun Li & Jian Xu, 0. "LogGAN: a Log-level Generative Adversarial Network for Anomaly Detection using Permutation Event Modeling," Information Systems Frontiers, Springer, vol. 0, pages 1-14.
    2. Saptarshi Ghosh & Kripabandhu Ghosh & Debasis Ganguly & Tanmoy Chakraborty & Gareth J. F. Jones & Marie-Francine Moens & Muhammad Imran, 2018. "Exploitation of Social Media for Emergency Relief and Preparedness: Recent Research and Trends," Information Systems Frontiers, Springer, vol. 20(5), pages 901-907, October.
    3. Chen Wang & Jack Strauss & Lei Zheng, 2021. "High-Speed Railway Opening and Corporate Fraud," Sustainability, MDPI, vol. 13(23), pages 1-23, December.
    4. Citra Sukmadilaga & Srihadi Winarningsih & Tri Handayani & Eva Herianti & Erlane K Ghani, 2022. "Fraudulent Financial Reporting in Ministerial and Governmental Institutions in Indonesia: An Analysis Using Hexagon Theory," Economies, MDPI, vol. 10(4), pages 1-14, April.
    5. Christian Hauser, 2019. "Fighting Against Corruption: Does Anti-corruption Training Make Any Difference?," Journal of Business Ethics, Springer, vol. 159(1), pages 281-299, September.
    6. Douglas Cumming & Sofia Johan & Denis Schweizer, 2017. "Information systems, agency problems, and fraud," Information Systems Frontiers, Springer, vol. 19(3), pages 421-424, June.
    7. Milad Mirbabaie & Deborah Bunker & Stefan Stieglitz & Annika Deubel, 2020. "Who Sets the Tone? Determining the Impact of Convergence Behaviour Archetypes in Social Media Crisis Communication," Information Systems Frontiers, Springer, vol. 22(2), pages 339-351, April.
    8. Shalak Mendon & Pankaj Dutta & Abhishek Behl & Stefan Lessmann, 2021. "A Hybrid Approach of Machine Learning and Lexicons to Sentiment Analysis: Enhanced Insights from Twitter Data of Natural Disasters," Information Systems Frontiers, Springer, vol. 23(5), pages 1145-1168, September.
    9. Rong Liu & Jujun Huang & Zhongju Zhang, 2023. "Tracking disclosure change trajectories for financial fraud detection," Production and Operations Management, Production and Operations Management Society, vol. 32(2), pages 584-602, February.
    10. A. Geethapriya & S. Valli, 2021. "An Enhanced Approach to Map Domain-Specific Words in Cross-Domain Sentiment Analysis," Information Systems Frontiers, Springer, vol. 23(3), pages 791-805, June.
    11. Ziwei Wang & Chunfeng Wang & Zhenming Fang, 2023. "Common institutional ownership and corporate misconduct," Managerial and Decision Economics, John Wiley & Sons, Ltd., vol. 44(1), pages 102-136, January.
    12. Zu, Xu & Diao, Xinyi & Meng, Zhiyi, 2019. "The impact of social media input intensity on firm performance: Evidence from Sina Weibo," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 536(C).
    13. GuoHua Cao & WenJun Geng & Jing Zhang & Qi Li, 2023. "Financial constraints, short selling and corporate fraud: Evidence from China," Australian Economic Papers, Wiley Blackwell, vol. 62(2), pages 297-320, June.
    14. Kuntara Pukthuanthong & Saif Ullah & Thomas J. Walker & Xuan Wu, 2017. "Timely vs. delayed CEO turnover," Information Systems Frontiers, Springer, vol. 19(3), pages 469-479, June.
    15. Shihang Wang & Zongmin Li & Yuhong Wang & Qi Zhang, 2019. "Machine Learning Methods to Predict Social Media Disaster Rumor Refuters," IJERPH, MDPI, vol. 16(8), pages 1-16, April.
    16. Xiaohui Zhang & Qianzhou Du & Zhongju Zhang, 2022. "A theory‐driven machine learning system for financial disinformation detection," Production and Operations Management, Production and Operations Management Society, vol. 31(8), pages 3160-3179, August.
    17. Milad Mirbabaie & Deborah Bunker & Stefan Stieglitz & Annika Deubel, 0. "Who Sets the Tone? Determining the Impact of Convergence Behaviour Archetypes in Social Media Crisis Communication," Information Systems Frontiers, Springer, vol. 0, pages 1-13.
    18. Jyoti Prakash Singh & Abhinav Kumar & Nripendra P. Rana & Yogesh K. Dwivedi, 2022. "Attention-Based LSTM Network for Rumor Veracity Estimation of Tweets," Information Systems Frontiers, Springer, vol. 24(2), pages 459-474, April.
    19. Petr Hajek & Mohammad Zoynul Abedin & Uthayasankar Sivarajah, 2023. "Fraud Detection in Mobile Payment Systems using an XGBoost-based Framework," Information Systems Frontiers, Springer, vol. 25(5), pages 1985-2003, October.
    20. Kuntara Pukthuanthong & Saif Ullah & Thomas J. Walker & Xuan Wu, 0. "Timely vs. delayed CEO turnover," Information Systems Frontiers, Springer, vol. 0, pages 1-11.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:infosf:v:23:y:2021:i:2:d:10.1007_s10796-020-10026-3. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.