Automatically defined groups for knowledge acquisition from computer logs and its extension for adaptive agent size. (English) Zbl 1181.68132

Castillo, Oscar (ed.) et al., Trends in intelligent systems and computer engineering (IMECS 2007). Selected papers based on the presentations at the international conference, Hong Kong, China, March 21–23, 2007. New York, NY: Springer (ISBN 978-0-387-74934-1/hbk). Lecture Notes in Electrical Engineering 6, 15-32 (2008).
Summary: Recently, a large amount of data is stored in databases through the advance of computer and network environments. To acquire knowledge from the databases is important for analyses of the present condition of the systems and for predictions of coming incidents. The log file is one of the databases stored automatically in computer systems. Unexpected incidents such as system troubles as well as the histories of daily service programs’ actions are recorded in the log files. System administrators have to check the messages in the log files in order to analyze the present condition of the systems. However, the descriptions of the messages are written in various formats according to the kinds of service programs and application software. It may be difficult to understand the meaning of the messages without the manuals or specifications. Moreover, the log files become enormous, and important messages are liable to mingle with a lot of insignificant messages. Therefore, checking the log files is a troublesome task for administrators.
Log monitoring tools such as SWATCH, in which regular expressions for representing problematic phrases are used for pattern matching, are effective for detecting well-known typical error messages. However, various programs running in the systems may be open source software or software companies’ products, and they may have been newly developed or upgraded recently. Therefore, it is impossible to detect all the problematic messages by the predefined rules. In addition, in order to cope with illegal use by hackers, it is important to detect unusual behavior such as the start of the unsupposed service program, even if the message does not correspond to the error message. To realize this system, the error-detection rules depending on the environment of the systems should be acquired adaptively by means of evolution or learning.
For the entire collection see [Zbl 1149.68008].


68P15 Database theory
68T05 Learning and adaptive systems in artificial intelligence


Full Text: DOI