Reference Hub3
Intelligent Log Analysis Using Machine and Deep Learning

Intelligent Log Analysis Using Machine and Deep Learning

Steven Yen, Melody Moh
ISBN13: 9781522581000|ISBN10: 1522581006|ISBN13 Softcover: 9781522594765|EISBN13: 9781522581017
DOI: 10.4018/978-1-5225-8100-0.ch007
Cite Chapter Cite Chapter

MLA

Yen, Steven, and Melody Moh. "Intelligent Log Analysis Using Machine and Deep Learning." Machine Learning and Cognitive Science Applications in Cyber Security, edited by Muhammad Salman Khan, IGI Global, 2019, pp. 154-189. https://doi.org/10.4018/978-1-5225-8100-0.ch007

APA

Yen, S. & Moh, M. (2019). Intelligent Log Analysis Using Machine and Deep Learning. In M. Khan (Ed.), Machine Learning and Cognitive Science Applications in Cyber Security (pp. 154-189). IGI Global. https://doi.org/10.4018/978-1-5225-8100-0.ch007

Chicago

Yen, Steven, and Melody Moh. "Intelligent Log Analysis Using Machine and Deep Learning." In Machine Learning and Cognitive Science Applications in Cyber Security, edited by Muhammad Salman Khan, 154-189. Hershey, PA: IGI Global, 2019. https://doi.org/10.4018/978-1-5225-8100-0.ch007

Export Reference

Mendeley
Favorite

Abstract

Computers generate a large volume of logs recording various events of interest. These logs are a rich source of information and can be analyzed to extract various insights about the system. However, due to its overwhelmingly large volume, logs are often mismanaged and not utilized effectively. The goal of this chapter is to help researchers and industrial professionals make more informed decisions about their logging solutions. It first lays the foundation by describing log sources and format. Then it describes all the components involved in logging. The remainder of the chapter provides a survey of different log analysis techniques and their applications, consisting of conventional techniques using rules and event correlators that can detect known issues, plus more advanced techniques such as statistical, machine learning, and deep learning techniques that can also detect unknown issues. The chapter concludes describing the underlying concepts of the techniques, their application to log analysis, and their comparative effectiveness.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.