[1] Zhao Y N, Xiao H L. The design of LARGE: log analyzing framework in grid environment[J]. E-science Technology & Application, 2016, 7(3): 3-7. 赵一宁, 肖海力. 网格环境日志分析框架LARGE的设计[J]. 科研信息化技术与应用, 2016, 7(3): 3-7.
[2] Dokas P, Ertoz L, Kumar V, et al. Data mining for network intrusion detection[C]//Proceedings of the 2002 National Science Foundation Workshop on Next Generation Data Mining, Marriott, Nov 1-3, 2002: 21-30.
[3] Vaarandi R. A data clustering algorithm for mining patterns from event logs[C]//Proceedings of the 3rd IEEE Workshop on IP Operations & Management, Kansas City, Oct 3, 2003. Piscataway: IEEE, 2003: 119-126.
[4] Vaarandi R. A breadth-first algorithm for mining frequent patterns from event logs[C]//LNCS 3283: Proceedings of the IFIP International Conference on Intelligence in Communication Systems, Bangkok, Nov 23-26, 2004. Berlin, Heidelberg: Springer, 2004: 293-308.
[5] Makanju A A O, Zincir-Heywood A N, Milios E E. Clustering event logs using iterative partitioning[C]//Proceedings of the 15th ACM SIGKDD International Conference on Know-ledge Discovery and Data Mining, Paris, Jun 28-Jul 1, 2009. New York: ACM, 2009: 1255-1264.
[6] Xu W, Huang L, Fox A, et al. Detecting large-scale system problems detection by mining console logs[C]//Proceedings of the ACM SIGOPS 22nd Symposium on Operating Sys-tems Principles, Oct 2009. New York: ACM, 2009: 117-132.
[7] Fronza I, Sillitti A, Succi G, et al. Failure prediction based on log files using random indexing and support vector machines[J]. Journal of Systems & Software, 2013, 86(1): 2-11.
[8] Weiss G M, Hirsh H. Learning to predict rare events in event sequences[C]//Proceedings of the 4th International Conference on Knowledge Discovery and Data Mining, New York, Aug 27-31, 1998. Menlo Park: AAAI, 1998: 359-363.
[9] Yamanishi K, Maruyama Y. Dynamic syslog mining for network failure monitoring[C]//Proceedings of the 11th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Chicago, Aug 21-24, 2005. New York: ACM, 2005: 499-508.
[10] Yuan D, Mai H H, Xiong W W, et al. SherLog: error diagnosis by connecting clues from run-time logs[J]. ACM SIGPLAN Notices, 2010, 45(3): 143-154.
[11] Peng W, Li T, Ma S. Mining logs files for data-driven system management[J]. SIGKDD Explorations, 2005, 7(1): 44-51.
[12] Prewett J E. Analyzing cluster log files using logsurfer[C]//Proceedings of the 4th Annual Conference on Linux Clusters, San Jose, Jun 11, 2003. San Jose: Linux Clusters, 2003: 1-26.
[13] Hansen S E, Atkins E T. Automated system monitoring and notification with Swatch[C]//Proceedings of the 7th Conference on Systems Administration, Monterey, Nov 1-5, 1993. Ber-keley: USENIX Association, 1993: 145-152.
[14] Zhao Y N, Xiao H L. Extracting log patterns from system logs in LARGE[C]//Proceedings of the 2016 IEEE Inter-national Parallel and Distributed Processing Symposium Workshops, Chicago, May 23-27, 2016. Washington: IEEE Computer Society, 2016: 1645-1652.
[15] Zhao Y N, Wang X D, Xiao H L, et al. Improvement of the log pattern extracting algorithm using text similarity[C]//Proceedings of the 2018 IEEE International Parallel and Distributed Processing Symposium Workshops, Vancouver, May 21-25, 2018. Washington: IEEE Computer Society, 2018: 507-514.
[16] Rousseeuw P J. Silhouettes: a graphical aid to the interpre-tation and validation of cluster analysis[J]. Journal of Computational and Applied Mathematics, 1987, 20: 53-65. |