{"id":"https://openalex.org/W4416549612","doi":"https://doi.org/10.1145/3719027.3760727","title":"Poster: GLog: Self-Evolving Log Anomaly Type Prediction via Instruction-Tuned LLM and Clustering","display_name":"Poster: GLog: Self-Evolving Log Anomaly Type Prediction via Instruction-Tuned LLM and Clustering","publication_year":2025,"publication_date":"2025-11-19","ids":{"openalex":"https://openalex.org/W4416549612","doi":"https://doi.org/10.1145/3719027.3760727"},"language":null,"primary_location":{"id":"doi:10.1145/3719027.3760727","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3719027.3760727","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5056068917","display_name":"Junwei Zhou","orcid":"https://orcid.org/0000-0002-6094-1203"},"institutions":[{"id":"https://openalex.org/I196699116","display_name":"Wuhan University of Technology","ror":"https://ror.org/03fe7t173","country_code":"CN","type":"education","lineage":["https://openalex.org/I196699116"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"JunWei Zhou","raw_affiliation_strings":["Wuhan University of Technology, Wuhan, Hubei, China"],"affiliations":[{"raw_affiliation_string":"Wuhan University of Technology, Wuhan, Hubei, China","institution_ids":["https://openalex.org/I196699116"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027961829","display_name":"Y. N. Gao","orcid":"https://orcid.org/0009-0004-3278-9402"},"institutions":[{"id":"https://openalex.org/I196699116","display_name":"Wuhan University of Technology","ror":"https://ror.org/03fe7t173","country_code":"CN","type":"education","lineage":["https://openalex.org/I196699116"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuyang Gao","raw_affiliation_strings":["Wuhan University of Technology, Wuhan, Hubei, China"],"affiliations":[{"raw_affiliation_string":"Wuhan University of Technology, Wuhan, Hubei, China","institution_ids":["https://openalex.org/I196699116"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102746341","display_name":"Cheng Tan","orcid":"https://orcid.org/0000-0002-2110-9529"},"institutions":[{"id":"https://openalex.org/I196699116","display_name":"Wuhan University of Technology","ror":"https://ror.org/03fe7t173","country_code":"CN","type":"education","lineage":["https://openalex.org/I196699116"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Cheng Tan","raw_affiliation_strings":["Wuhan University of Technology, Wuhan, Hubei, China"],"affiliations":[{"raw_affiliation_string":"Wuhan University of Technology, Wuhan, Hubei, China","institution_ids":["https://openalex.org/I196699116"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5104106159","display_name":"Yanchao Yang","orcid":"https://orcid.org/0009-0003-9012-8971"},"institutions":[{"id":"https://openalex.org/I196699116","display_name":"Wuhan University of Technology","ror":"https://ror.org/03fe7t173","country_code":"CN","type":"education","lineage":["https://openalex.org/I196699116"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yanchao Yang","raw_affiliation_strings":["Wuhan University of Technology, Wuhan, Hubei, China"],"affiliations":[{"raw_affiliation_string":"Wuhan University of Technology, Wuhan, Hubei, China","institution_ids":["https://openalex.org/I196699116"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5016677170","display_name":"Jianwen Xiang","orcid":"https://orcid.org/0000-0001-8440-4181"},"institutions":[{"id":"https://openalex.org/I196699116","display_name":"Wuhan University of Technology","ror":"https://ror.org/03fe7t173","country_code":"CN","type":"education","lineage":["https://openalex.org/I196699116"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianwen Xiang","raw_affiliation_strings":["Wuhan University of Technology, Wuhan, Hubei, China"],"affiliations":[{"raw_affiliation_string":"Wuhan University of Technology, Wuhan, Hubei, China","institution_ids":["https://openalex.org/I196699116"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5056068917"],"corresponding_institution_ids":["https://openalex.org/I196699116"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.43541431,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"4791","last_page":"4793"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":9.999999747378752e-05,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":9.999999747378752e-05,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.8241999745368958},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.6942999958992004},{"id":"https://openalex.org/keywords/observability","display_name":"Observability","score":0.578000009059906},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.5669000148773193},{"id":"https://openalex.org/keywords/semantics","display_name":"Semantics (computer science)","score":0.5214999914169312},{"id":"https://openalex.org/keywords/type","display_name":"Type (biology)","score":0.5206999778747559},{"id":"https://openalex.org/keywords/data-type","display_name":"Data type","score":0.44589999318122864},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.42980000376701355}],"concepts":[{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.8241999745368958},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.6942999958992004},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6360999941825867},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5884000062942505},{"id":"https://openalex.org/C36299963","wikidata":"https://www.wikidata.org/wiki/Q1369844","display_name":"Observability","level":2,"score":0.578000009059906},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.5669000148773193},{"id":"https://openalex.org/C184337299","wikidata":"https://www.wikidata.org/wiki/Q1437428","display_name":"Semantics (computer science)","level":2,"score":0.5214999914169312},{"id":"https://openalex.org/C2777299769","wikidata":"https://www.wikidata.org/wiki/Q3707858","display_name":"Type (biology)","level":2,"score":0.5206999778747559},{"id":"https://openalex.org/C138958017","wikidata":"https://www.wikidata.org/wiki/Q190087","display_name":"Data type","level":2,"score":0.44589999318122864},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.42980000376701355},{"id":"https://openalex.org/C79337645","wikidata":"https://www.wikidata.org/wiki/Q779824","display_name":"Outlier","level":2,"score":0.3677000105381012},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3515999913215637},{"id":"https://openalex.org/C48372109","wikidata":"https://www.wikidata.org/wiki/Q3913","display_name":"Binary number","level":2,"score":0.3301999866962433},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.3230000138282776},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.3206999897956848},{"id":"https://openalex.org/C2776321320","wikidata":"https://www.wikidata.org/wiki/Q857525","display_name":"Annotation","level":2,"score":0.31310001015663147},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.3095000088214874},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.2939000129699707},{"id":"https://openalex.org/C61797465","wikidata":"https://www.wikidata.org/wiki/Q1188986","display_name":"Term (time)","level":2,"score":0.28450000286102295},{"id":"https://openalex.org/C2780009758","wikidata":"https://www.wikidata.org/wiki/Q6804172","display_name":"Measure (data warehouse)","level":2,"score":0.27090001106262207},{"id":"https://openalex.org/C89600930","wikidata":"https://www.wikidata.org/wiki/Q1423946","display_name":"Segmentation","level":2,"score":0.26829999685287476}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3719027.3760727","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3719027.3760727","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":3,"referenced_works":["https://openalex.org/W4292968359","https://openalex.org/W4319990463","https://openalex.org/W4376288669"],"related_works":[],"abstract_inverted_index":{"Log":[0],"anomaly":[1,55,76,93,111,125],"detection":[2,77],"is":[3],"critical":[4],"for":[5,102],"maintaining":[6],"system":[7,137],"reliability":[8],"and":[9,14,33,96,121,133],"observability":[10],"in":[11,139],"complex":[12],"cloud":[13],"microservice":[15],"environments.":[16,141],"However,":[17],"existing":[18],"methods":[19],"often":[20],"remain":[21],"limited":[22],"to":[23,27,29,39,73,89,108,135],"binary":[24],"classification,":[25],"struggle":[26],"adapt":[28],"dynamic":[30,54],"log":[31,40,81,119],"patterns,":[32],"suffer":[34],"from":[35],"semantic":[36],"loss":[37],"due":[38],"parsing.":[41],"To":[42],"address":[43],"these":[44],"challenges,":[45],"we":[46],"propose":[47],"GLog,":[48],"an":[49],"end-to-end":[50],"framework":[51],"that":[52],"enables":[53],"type":[56,61,94,126],"prediction":[57],"without":[58],"requiring":[59],"manual":[60,130],"labels.":[62],"GLog":[63,128],"first":[64],"fine-tunes":[65],"instruction-tuned":[66],"large":[67],"language":[68],"models":[69],"using":[70],"normal/abnormal":[71],"labels":[72,95],"achieve":[74],"high-accuracy":[75],"on":[78],"raw,":[79],"unparsed":[80],"sequences.":[82],"It":[83],"then":[84],"clusters":[85],"the":[86,106],"detected":[87],"anomalies":[88],"automatically":[90],"generate":[91],"pseudo":[92],"descriptions,":[97],"which":[98],"are":[99],"further":[100],"used":[101],"second-stage":[103],"fine-tuning,":[104],"enabling":[105],"model":[107],"predict":[109],"specific":[110],"types":[112],"with":[113],"interpretable":[114],"outputs.":[115],"By":[116],"leveraging":[117],"full":[118],"semantics":[120],"dynamically":[122],"updating":[123],"its":[124],"repository,":[127],"reduces":[129],"annotation":[131],"costs":[132],"adapts":[134],"evolving":[136],"behaviors":[138],"large-scale":[140]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-11-23T00:00:00"}
