Computer Science ›› 2022, Vol. 49 ›› Issue (12): 125-135.doi: 10.11896/jsjkx.220200106
• Computer Software • Previous Articles Next Articles
WANG Bo1,2,3, HUA Qing-yi1, SHU Xin-feng2
CLC Number:
[1]HUANG H,ZHANG H,SHAO D.Practical Impacts of Automation Tools in Support of DevOps in China[J].Journal of Software,2019,30(10):3056-3070. [2]SUN C A,JIN M Z,LIU C.Overviews on software Architecture[J].Journal of Software,2002,13(7):1228-1237. [3]SUN W X,ZHAI Y L,BAO T H,et al.A Microservices Oriented Edge Computing Framework for LVC Simulation in the IoT Era[C]//Proceedings of the 11th International Conference on Computer Modeling and Simulation(ICCMS 2019).Association for Computing Machinery,New York,USA,2019:190-195. [4]ZHU J,HE S,LIU J,et al.Tools and Benchmarks for Automated Log Parsing[C]//2019 IEEE/ACM 41st International Conference on Software Engineering.Software Engineering in Practice(ICSE-SEIP).2019:121-130. [5]HE S,ZHU J,HE P,et al.Experience Report:System LogAnalysis for Anomaly Detection[C]//2016 IEEE 27th International Symposium on Software Reliability Engineering(ISSRE).2016:207-218. [6]VERVAET A.MoniLog:An Automated Log-Based AnomalyDetection System for Cloud Computing Infrastructures[C]//2021 IEEE 37th International Conference on Data Engineering(ICDE).2021:2739-2743. [7]MALLIKARJUN B C,ANNAPOORNESHWARI K,MADHANY M,et al.Intelligent Automated Text Processing System-An NLP Based Approach[C]//2020 5th International Conference on Communication and Electronics Systems(ICCES).2020:1026-1030. [8]RAND J,MIRANSKYY A.On Automatic Parsing of Log Records[C]//2021 IEEE/ACM 43rd International Conference on Software Engineering:New Ideas and Emerging Results(ICSE-NIER).2021:41-45. [9]XIAO T,QUAN Z,WANG Z J,et al.LPV:A Log Parser Based on Vectorization for Offline and Online Log Parsing[C]//2020 IEEE International Conference on Data Mining(ICDM).2020:1346-1351. [10]YADAV R B,KUMAR P S,DHAVALE S V.A Survey on Log Anomaly Detection using Deep Learning[C]//2020 8th International Conference on Reliability,Infocom Technologies and Optimization(Trends and Future Directions)(ICRITO).2020:1215-1220. [11]HAN S B,WU Q H,ZHANG H,et al.Log-Based Anomaly Detection With Robust Feature Extraction and Online Learning[J].IEEE Transactions on Information Forensics and Security,2021,16:2300-2311. [12]MARLAITHONG T,BARROSO V C,PHUNCHONGHARN P.A Hyperparameter Tuning Approach for an Online Log Parser[C]//18th International Conference on Electrical Enginee-ring/Electronics,Computer,Telecommunications and Information Technology(ECTI-CON).2021:1036-1040. [13]WON H,KIM Y.Performance Analysis of Machine Learning Based Fault Detection for Cloud Infrastructure[C]//2021 International Conference on Information Networking(ICOIN).2021:877-880. [14]YANG L,CHEN J J,WANG Z,et al.Semi-Supervised Log-Based Anomaly Detection via Probabilistic Label Estimation[C]//2021 IEEE/ACM 43rd International Conference on Software Engineering(ICSE).2021:1448-1460. [15]HAN Y,MA Y,WANG J,WANG J.Research on ensemblemodel of anomaly detection based on autoencoder[C]//2020 IEEE 20th International Conference on Software Quality,Reliability and Security(QRS).2020:414-417. [16]PROVOTAR O I,LINDER Y M,VERES M M.Unsupervised Anomaly Detection in Time Series Using LSTM-Based Auto-encoders[C]//2019 IEEE International Conference on Advanced Trends in Information Theory(ATIT).2019:513-517. [17]PU G,WANG L J,SHEN J,et al.A Hybrid Unsupervised Clustering-Based Anomaly Detection Method[J].Tsinghua Science and Technology,2021,26(2):146-153. [18]YILMAZ S F,KOZAT S S.Robust Anomaly Detection via Sequential Ensemble Learning[C]//2020 28th Signal Processing and Communications Applications Conference(SIU).2020:1-4. [19]DANG Y,LIN Q,HUANG P.AIOps:Real-World Challenges and Research Innovations[C]//IEEE/ACM 41st International Conference on Software Engineering:Companion Proceedings(ICSE-Companion).2019:4-5. [20]HE P,ZHU J,HE S,et al.Towards Automated Log Parsing for Large-Scale Log Data Analysis[J].IEEE Transactions on Dependable and Secure Computing,2018,15(6):931-944. [21]ZHANG Y,TIČO P,LEONARDIS A,et al.A Survey on Neural Network Interpretability[J].IEEE Transactions on Emerging Topics in Computational Intelligence,2021,5(5):726-742. [22]LATHA R S,SREEKANTH G R R,SUGANTHE R C,et al.A survey on the applications of Deep Neural Networks[C]//2021 International Conference on Computer Communication and Informatics(ICCCI).2021:1-3. [23]RINCY T N,GUPTA R.Ensemble Learning Techniques and its Efficiency in Machine Learning:A Survey[C]//2nd Inter-national Conference on Data,Engineering and Applications(IDEA).2020:1-6. [24]SRAVANTHI N,VENKAT M L,HARSHINI S,et al.An Ensemble Approach to Predict Weather Forecast using Machine Learning[C]//2020 International Conference on Smart Electronics and Communication(ICOSEC).2020:436-440. [25]WANG K,LIU X,ZHAO J,et al.Application Research of Ensemble Learning Frameworks[C]//2020 Chinese Automation Congress(CAC).2020:5767-5772. [26]TANG X,ASTLE Y S,FREEMAN C.Deep Anomaly Detection with Ensemble-Based Active Learning[C]//2020 IEEE International Conference on Big Data(Big Data).2020:1663-1670. [27]BECKER S,SCHMIDT F A,GULENKO,et al.Towards AIOps in Edge Computing Environments[C]//2020 IEEE International Conference on Big Data(Big Data).2020:3470-3475. [28]ANNA L,SHELLY G,ELLIOT K K.AIOps for a Cloud Object Storage Service[C]//2019 IEEE International Congress on Big Data(Big Data Congress).2019:165-169. [29]VAARANDI R.A data clustering algorithm for mining patterns from event logs[C]//Proceedings of the 3rd IEEE Workshop on IP Operations & Management(IPOM 2003)(IEEE Cat.No.03EX764).2003:119-126. [30]VAARANDI R,PIHELGAS M.LogCluster-A data clusteringand pattern mining algorithm for event logs[C]//2015 11th International Conference on Network and Service Management(CNSM).2015:1-7. [31]ADETOKUNBO A O,MAKANJU A.Nur Zincir-Heywood,and Evangelos E.Milios.Clustering event logs using iterative partitioning[C]//Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining(KDD ’09).Association for Computing Machinery,New York,USA,2009:1255-1264. [32]FU Q,LOU J,WANG Y,et al.Execution Anomaly Detection in Distributed Systems through Unstructured Log Analysis[C]//2009 Ninth IEEE International Conference on Data Mining.2009:149-158. [33]DU M,LI F.Spell:Streaming Parsing of System Event Logs[C]//2016 IEEE 16th International Conference on Data Mining(ICDM).2016:859-864. [34]HE P,ZHU J,ZHENG Z,et al.Drain:An Online Log Parsing Approach with Fixed Depth Tree[C]//2017 IEEE International Conference on Web Services(ICWS).2017:33-40. [35]TIMČENKO V,GAJIN S.Ensemble classifiers for supervised anomaly based network intrusion detection[C]//2017 13th IEEE International Conference on Intelligent Computer Communication and Processing(ICCP).2017:13-19. [36]DU M,LI F F,ZHENG G N,et al.DeepLog:Anomaly Detection and Diagnosis from System Logs through Deep Learning[C]//Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security(CCS ’17).Association for Computing Machinery,New York,USA,2017:1285-1298. [37]LIU D P,ZHAO Y J,XU H W,et al.Opprentice:Towards Practical and Automatic Anomaly Detection Through Machine Learning[C]//Proceedings of the 2015 Internet Measurement Conference(IMC ’15).Association for Computing Machinery,New York,USA,2015:211-224. [38]NEDELKOSKI S,CARDOSO J,KAO O.Anomaly Detectionfrom System Tracing Data Using Multimodal Deep Learning[C]//2019 IEEE 12th International Conference on Cloud Computing(CLOUD).2019:179-186. [39]DROMARD J,ROUDIÈRE GOWEZARSKI P.Online and Sca-lable Unsupervised Network Anomaly Detection Method[J].IEEE Transactions on Network and Service Management,2017,14(1):34-47. [40]YOO T H.The Infinite NHPP Software Reliability Model based on Monotonic Intensity Function[J/OL].https://www.researchgate.net/publication/282984295_The_Infinite_NHPP_Software_Reliability_Model_based_on_Monotonic_Intensity_Function. [41]JELINSKI Z,MORANDA P.Software Reliability Research[C]//Statistical Computer Performance Evaluation.1972:465-484. [42]YI J,LUO X,AO J X,et al.Software fault classification prediction model based on Markov chain[J].Journal of University of Chinese Academy of Sciences,2013,30(4):562-567. [43]ZHANG H,ZHANG X.Data Mining Static Code Attributes to Learn Defect Predictors[J].IEEE Transactions on Software Engineering,2007,33(9):635-637. [44]MUHAMMED M Ö,UNAL C,AHMET Z.A novel defect prediction method for web pages using k-means++[J].Expert Systems with Applications,2015,42(19):6496-6506. [45]JIN C,JIN S W.Software reliability prediction model based on support vector regression with improved estimation of distribution algorithms[J].Applied Soft Computing,2014,15:113-120. [46]OKAMURA H,DOHI T.A Novel Framework of Software Reliability Evaluation with Software Reliability Growth Models and Software Metrics[C]//IEEE 15th International Symposium on High-Assurance Systems Engineering.2014:97-104. [47]HARIKESH B Y,DILIP K Y.A fuzzy logic based approach for phase-wise software defects prediction using software metrics[J].Information and Software Technology,2015,63(C):44-57. [48]SELIYA N,KHOSHGOFTAAR T M.Software Quality Analysis of Unlabeled Program Modules With Semisupervised Clustering[J].IEEE Transactions on Systems,Man,and Cybernetics-Part A:Systems and Humans,2007,37(2):201-211. [49]SELIYA N,KHOSHGOFTAAR T M.Software quality estimation with limited fault data:a semi-supervised learning perspective[J].Software Quality Journal,2007,15(3):327-344. [50]XU W,HUANG L,FOX A,et al.Detecting large-scale system problems by mining console logs[C]//Proceedings of the ACM SIGOPS 22nd Symposium on Operating Systems Principles(SOSP ’09).Association for Computing Machinery,New York,USA,2009:117-132. [51]KUBAT P.Assessing reliability of modular software[J].Operations Research Letters,1989,8(1):35-41. [52]GOKHALE S S,TRIVEDI K S.Analytical Models for Architecture-Based Software Reliability Prediction:A Unification Framework[J].IEEE Transactions on Reliability,2006,55(4):578-590. [53]LI B X,SU Z Y,ZHOU Y,et al.A user-oriented Web service reliability model[C]//IEEE International Conference on Systems,Man and Cybernetics.2008:3612-3617. [54]WEI Y,SHEN X.Heterogeneous Architecture-Based Software Reliability Estimation:Case Study[C]//Third International Conference on Convergence and Hybrid Information Techno-logy.2008:286-290. [55]GOKHALE S S,MICHAELLI R S.A simulation approach tostructure-based software reliability analysis[J].IEEE Transactions on Software Engineering,2005,31(8):643-656. [56]GUO Y.Research on Reliability Evaluation for Compnnent-based Software System[D].Harbin:Harbin Institute of Technology,2013. [57]WANG W L,WU Y,CHEN M H.An architecture-based software reliability model[C]//Proceedings 1999 Pacific Rim International Symposium on Dependable Computing.1999:143-150. |
[1] | XU Tian-hui, GUO Qiang, ZHANG Cai-ming. Time Series Data Anomaly Detection Based on Total Variation Ratio Separation Distance [J]. Computer Science, 2022, 49(9): 101-110. |
[2] | WANG Xin-tong, WANG Xuan, SUN Zhi-xin. Network Traffic Anomaly Detection Method Based on Multi-scale Memory Residual Network [J]. Computer Science, 2022, 49(8): 314-322. |
[3] | DU Hang-yuan, LI Duo, WANG Wen-jian. Method for Abnormal Users Detection Oriented to E-commerce Network [J]. Computer Science, 2022, 49(7): 170-178. |
[4] | LIN Xi, CHEN Zi-zhuo, WANG Zhong-qing. Aspect-level Sentiment Classification Based on Imbalanced Data and Ensemble Learning [J]. Computer Science, 2022, 49(6A): 144-149. |
[5] | KANG Yan, WU Zhi-wei, KOU Yong-qi, ZHANG Lan, XIE Si-yu, LI Hao. Deep Integrated Learning Software Requirement Classification Fusing Bert and Graph Convolution [J]. Computer Science, 2022, 49(6A): 150-158. |
[6] | WANG Yu-fei, CHEN Wen. Tri-training Algorithm Based on DECORATE Ensemble Learning and Credibility Assessment [J]. Computer Science, 2022, 49(6): 127-133. |
[7] | HAN Hong-qi, RAN Ya-xin, ZHANG Yun-liang, GUI Jie, GAO Xiong, YI Meng-lin. Study on Cross-media Information Retrieval Based on Common Subspace Classification Learning [J]. Computer Science, 2022, 49(5): 33-42. |
[8] | SHEN Shao-peng, MA Hong-jiang, ZHANG Zhi-heng, ZHOU Xiang-bing, ZHU Chun-man, WEN Zuo-cheng. Three-way Drift Detection for State Transition Pattern on Multivariate Time Series [J]. Computer Science, 2022, 49(4): 144-151. |
[9] | WU Yu-kun, LI Wei, NI Min-ya, XU Zhi-cheng. Anomaly Detection Model Based on One-class Support Vector Machine Fused Deep Auto-encoder [J]. Computer Science, 2022, 49(3): 144-151. |
[10] | LENG Jia-xu, TAN Ming-pi, HU Bo, GAO Xin-bo. Video Anomaly Detection Based on Implicit View Transformation [J]. Computer Science, 2022, 49(2): 142-148. |
[11] | REN Shou-peng, LI Jin, WANG Jing-ru, YUE Kun. Ensemble Regression Decision Trees-based lncRNA-disease Association Prediction [J]. Computer Science, 2022, 49(2): 265-271. |
[12] | CHEN Wei, LI Hang, LI Wei-hua. Ensemble Learning Method for Nucleosome Localization Prediction [J]. Computer Science, 2022, 49(2): 285-291. |
[13] | XU Kun-cai, FENG Bao, CHEN Ye-hang, LIU Yu, ZHOU Hao-yang, CHEN Xiang-meng. Thymoma CT Image Prediction Method Based on Deep Learning and Improved Extreme Learning Machine Ensemble Learning [J]. Computer Science, 2022, 49(11A): 211200097-6. |
[14] | WANG Ying-hui, LI Wei-hua, LI Chuan, CHEN Wei, WEN Jun-ying. Prediction of Antigenic Similarity of Influenza A/H5N1 Virus Based on Attention Mechanism and Ensemble Learning [J]. Computer Science, 2022, 49(11A): 210900032-6. |
[15] | ZHOU Shi-jin, XING Hong-jieHebei. Memory-augmented GAN-based Anomaly Detection [J]. Computer Science, 2022, 49(11A): 211000202-9. |
|