Anomaly detection method and device and monitoring equipment

A technology for anomaly detection and monitoring equipment, which is applied in the fields of instruments, calculations, and electrical digital data processing, etc. It can solve the problems of time-consuming and labor-intensive analysis, difficulty in text data anomaly detection, and large quantity, so as to improve development efficiency and fast anomaly detection and the effect of fault localization

Active Publication Date: 2017-06-13
北京睿象科技有限公司
View PDF9 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, these text data are usually huge in quantity and difficult to read. It is time-consuming and labor-intensive to analyze them, so it is difficult to detect anomalies based on text data.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anomaly detection method and device and monitoring equipment
  • Anomaly detection method and device and monitoring equipment
  • Anomaly detection method and device and monitoring equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0028] As mentioned above, the log files generated by users accessing network devices usually contain a large amount of text data and are difficult to read. Therefore, it is very necessary to perform data mining on log data and extract useful knowledge from them. In the embodiment of the present invention, the text pattern can be generated according to these text data, the text pattern is the frequent information or message sequence...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an anomaly detection method. The method is executed in monitoring equipment, and is suitable for carrying out anomaly detection on a target application in one or more application servers. The method comprises the steps that a log file generated when a user has access to the target application is acquired, wherein the log file comprises a plurality of pieces of text data; the log file is subjected to mode matching according to a text mode library, and text modes corresponding to all the text data respectively are generated; the text data is subjected to classified statistics according to the text modes, and a statistic result is obtained; whether the target application is abnormal or not is judged according to the statistic result. The invention further discloses a corresponding anomaly detection device and the monitoring equipment.

Description

technical field [0001] The invention relates to the technical field of computers and the Internet, in particular to an anomaly detection method, device and monitoring equipment. Background technique [0002] With the vigorous development of Internet technology, computers have become an indispensable tool for people's daily work or communication. When a user uses a computing device, the network device will generate various text data such as log, url, and trace. These text data record descriptions of related operations such as date, time, user, and action. By analyzing these text data, operation and maintenance personnel can monitor the health status of the system and network in real time, as well as the usage of users. [0003] However, these text data are usually huge in quantity and difficult to understand, and it is time-consuming and labor-intensive to analyze them, so it is difficult to detect anomalies based on text data. Therefore, there is a need to provide a more e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/30G06F17/27
CPCG06F16/3344G06F40/284
Inventor 阮松松姜宁何晓阳
Owner 北京睿象科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products