Search Results for author: Alexander Acker

Found 16 papers, 6 papers with code

PULL: Reactive Log Anomaly Detection Based On Iterative PU Learning

no code implementations25 Jan 2023 Thorsten Wittkopp, Dominik Scheinert, Philipp Wiesner, Alexander Acker, Odej Kao

Due to the complexity of modern IT services, failures can be manifold, occur at any stage, and are hard to detect.

Anomaly Detection

Data-Driven Approach for Log Instruction Quality Assessment

1 code implementation6 Apr 2022 Jasmin Bogatinovski, Sasho Nedelkoski, Alexander Acker, Jorge Cardoso, Odej Kao

We start with an in-depth analysis of quality log instruction properties in nine software systems and identify two quality properties: 1) correct log level assignment assessing the correctness of the log level, and 2) sufficient linguistic structure assessing the minimal richness of the static text necessary for verbose event description.

LogLAB: Attention-Based Labeling of Log Data Anomalies via Weak Supervision

no code implementations2 Nov 2021 Thorsten Wittkopp, Philipp Wiesner, Dominik Scheinert, Alexander Acker

With increasing scale and complexity of cloud operations, automated detection of anomalies in monitoring data such as logs will be an essential part of managing future IT infrastructures.

Bellamy: Reusing Performance Models for Distributed Dataflow Jobs Across Contexts

1 code implementation29 Jul 2021 Dominik Scheinert, Lauritz Thamsen, Houkun Zhu, Jonathan Will, Alexander Acker, Thorsten Wittkopp, Odej Kao

First, a general model is trained on all the available data for a specific scalable analytics algorithm, hereby incorporating data from different contexts.

Descriptive

Learning Dependencies in Distributed Cloud Applications to Identify and Localize Anomalies

1 code implementation9 Mar 2021 Dominik Scheinert, Alexander Acker, Lauritz Thamsen, Morgan K. Geldenhuys, Odej Kao

Operation and maintenance of large distributed cloud applications can quickly become unmanageably complex, putting human operators under immense stress when problems occur.

TELESTO: A Graph Neural Network Model for Anomaly Classification in Cloud Services

no code implementations25 Feb 2021 Dominik Scheinert, Alexander Acker

Deployment, operation and maintenance of large IT systems becomes increasingly complex and puts human experts under extreme stress when problems occur.

Anomaly Classification Classification +3

Robust and Transferable Anomaly Detection in Log Data using Pre-Trained Language Models

no code implementations23 Feb 2021 Harold Ott, Jasmin Bogatinovski, Alexander Acker, Sasho Nedelkoski, Odej Kao

To that end, we utilize pre-trained general-purpose language models to preserve the semantics of log messages and map them into log vector embeddings.

Anomaly Detection

Towards AIOps in Edge Computing Environments

no code implementations12 Feb 2021 Soeren Becker, Florian Schmidt, Anton Gulenko, Alexander Acker, Odej Kao

Edge computing was introduced as a technical enabler for the demanding requirements of new network technologies like 5G.

Anomaly Detection Cloud Computing +2

Artificial Intelligence for IT Operations (AIOPS) Workshop White Paper

no code implementations15 Jan 2021 Jasmin Bogatinovski, Sasho Nedelkoski, Alexander Acker, Florian Schmidt, Thorsten Wittkopp, Soeren Becker, Jorge Cardoso, Odej Kao

Finally, all this will result in faster adoption of AIOps, further increase the interest in this research field and contribute to bridging the gap towards fully-autonomous operating IT systems.

Decision Making Management

Self-Attentive Classification-Based Anomaly Detection in Unstructured Logs

no code implementations21 Aug 2020 Sasho Nedelkoski, Jasmin Bogatinovski, Alexander Acker, Jorge Cardoso, Odej Kao

We propose Logsy, a classification-based method to learn log representations in a way to distinguish between normal data from the system of interest and anomaly samples from auxiliary log datasets, easily accessible via the internet.

Anomaly Detection Classification +1

Superiority of Simplicity: A Lightweight Model for Network Device Workload Prediction

1 code implementation7 Jul 2020 Alexander Acker, Thorsten Wittkopp, Sasho Nedelkoski, Jasmin Bogatinovski, Odej Kao

First, KPI types like CPU utilization or allocated memory are very different and hard to be expressed by the same model.

Time Series Forecasting

Self-Supervised Log Parsing

2 code implementations17 Mar 2020 Sasho Nedelkoski, Jasmin Bogatinovski, Alexander Acker, Jorge Cardoso, Odej Kao

This allows the coupling of the MLM as pre-training with a downstream anomaly detection task.

Anomaly Detection Fault Detection +4

Cannot find the paper you are looking for? You can Submit a new open access paper.