What Information Contributes to Log-based Anomaly Detection? Insights from a Configurable Transformer-Based Approach

📅 2024-09-30
🏛️ arXiv.org
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
This work addresses the unclear roles of semantic, sequential, and temporal information in log-based anomaly detection. We propose a configurable Transformer model—the first to decouple and quantitatively assess the individual contributions of event occurrence, sequential ordering, and precise timestamp information. The model incorporates token embeddings, dynamic positional encoding, maskable timestamp encoding, and an adaptive truncation mechanism to support variable-length log inputs. Extensive experiments on multiple benchmark datasets reveal that event occurrence is the dominant factor for detection, whereas sequential and temporal features yield only marginal gains; moreover, existing benchmarks are overly simplistic and fail to reflect the complexity of real-world anomalies. Our findings challenge prevailing time-series modeling paradigms in log analysis and provide novel insights for log representation learning and benchmark design.

Technology Category

Application Category

📝 Abstract
Log data are generated from logging statements in the source code, providing insights into the execution processes of software applications and systems. State-of-the-art log-based anomaly detection approaches typically leverage deep learning models to capture the semantic or sequential information in the log data and detect anomalous runtime behaviors. However, the impacts of these different types of information are not clear. In addition, existing approaches have not captured the timestamps in the log data, which can potentially provide more fine-grained temporal information than sequential information. In this work, we propose a configurable transformer-based anomaly detection model that can capture the semantic, sequential, and temporal information in the log data and allows us to configure the different types of information as the model's features. Additionally, we train and evaluate the proposed model using log sequences of different lengths, thus overcoming the constraint of existing methods that rely on fixed-length or time-windowed log sequences as inputs. With the proposed model, we conduct a series of experiments with different combinations of input features to evaluate the roles of different types of information in anomaly detection. When presented with log sequences of varying lengths, the model can attain competitive and consistently stable performance compared to the baselines. The results indicate that the event occurrence information plays a key role in identifying anomalies, while the impact of the sequential and temporal information is not significant for anomaly detection in the studied public datasets. On the other hand, the findings also reveal the simplicity of the studied public datasets and highlight the importance of constructing new datasets that contain different types of anomalies to better evaluate the performance of anomaly detection models.
Problem

Research questions and friction points this paper is trying to address.

Evaluates impact of semantic, sequential, temporal information in log-based anomaly detection.
Proposes configurable Transformer model for varying-length log sequences.
Highlights need for new datasets with diverse anomalies for better evaluation.
Innovation

Methods, ideas, or system contributions that make the work stand out.

Configurable Transformer model for anomaly detection
Captures semantic, sequential, temporal log information
Supports variable-length log sequences as inputs
🔎 Similar Papers
No similar papers found.
X
Xingfang Wu
Department of Computer and Software Engineering, Polytechnique Montréal, Montréal, Québec, Canada.
H
Heng Li
Department of Computer and Software Engineering, Polytechnique Montréal, Montréal, Québec, Canada.
Foutse Khomh
Foutse Khomh
NSERC Arthur B. McDonald Fellow, CRC Tier 1, Canada CIFAR AI Chair, FRQ-IVADO Chair, Full Professor
Software engineeringMachine learning systems engineeringMining software repositoriesReverse