Essays about: "Log-data"

Showing result 1 - 5 of 56 essays containing the word Log-data.

  1. 1. A Comparative Analysis of the Ingestion and Storage Performance of Log Aggregation Solutions: Elastic Stack & SigNoz

    University essay from Mälardalens universitet/Akademin för innovation, design och teknik

    Author : Robert Duras; [2024]
    Keywords : Elastic Stack; ELK; SigNoz; Beats; Logstash; Elasticsearch; Kibana; OpenTelemetry; ClickHouse; Log; Logging; Log Data; Log Aggregation; Performance; Ingestion; Storage;

    Abstract : As infrastructures and software grow in complexity the need to keep track of things becomes important. It is the job of log aggregation solutions to condense log data into a form that is easier to search, visualize, and analyze. READ MORE

  2. 2. Log Frequency Analysis for Anomaly Detection in Cloud Environments

    University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknik

    Author : Prathyusha Bendapudi; [2024]
    Keywords : Log Analysis; Log Frequency Patterns; anomaly detection; machine learning; cloud environments;

    Abstract : Background: Log analysis has been proven to be highly beneficial in monitoring system behaviour, detecting errors and anomalies, and predicting future trends in systems and applications. However, with continuous evolution of these systems and applications, the amount of log data generated on a timely basis is increasing rapidly. READ MORE

  3. 3. Evaluating Process Mining Techniques on PACS Command Usage Data : Exploring common process mining techniques and evaluating their applicability on PACS event log data for domain-specific workflow analysis

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Axel Ekblom; Jacob Karlén; [2023]
    Keywords : process mining; workflow mining; data mining; radiology; PACS;

    Abstract : Many software companies today collect command usage data by monitoring and logging user interactions within their applications. This is not always utilised to its full potential, but with the use of state-of-the-art process mining techniques, this command usage log data can be used to gain insights about the users' workflows. READ MORE

  4. 4. Supervised Failure Diagnosis of Clustered Logs from Microservice Tests

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Amanda Strömdahl; [2023]
    Keywords : Supervised Learning; Failure Diagnosis; Clustered Log Data; Random Forest; SVM; MLP; Övervakad inlärning; feldiagnos; klustrad logg-data; Random Forest; SVM; MLP;

    Abstract : Pinpointing the source of a software failure based on log files can be a time consuming process. Automated log analysis tools are meant to streamline such processes, and can be used for tasks like failure diagnosis. This thesis evaluates three supervised models for failure diagnosis of clustered log data. READ MORE

  5. 5. An Attribution Method for Alerts in an Educational Cyber Range based on Graph Database

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Yang Wang; [2023]
    Keywords : Network Attribution. Cyber Range; Ethical Hacking Course. Graph Database.; Nätverksattribuering; Cyberområde; Etisk Hackningskurs; Grafisk Databas;

    Abstract : Finding the source of events in a network is a critical problem in network security, and this process is called network attribution. This thesis develops a system to attribute alerts from the cyber range of the Ethical Hacking Course at KTH to students. The cyber range is an essential component of the Ethical Hacking course. READ MORE