Discovering Frequent Itemsets Over Event Logs Using ECLAT Algorithm

  • Conference paper
  • First Online:
International Proceedings on Advances in Soft Computing, Intelligent Systems and Applications

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 628))

  • 815 Accesses

Abstract

Event logs are files that can record significant events that occur on a computing device. For example, when a user logs in or logs out, when the device encounters an error, etc., events are recorded. These events logs can be used to troubleshoot the device when it is down or works inappropriately. Generally, automatic device troubleshoot includes mining interesting patterns inside log events and classifying them as normal patterns or anomalies. In this paper, we are providing a sequential mining technique named ECLAT to discover interesting patterns over event logs.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Similar content being viewed by others

References

  1. Hansen, Stephen E., and E. Todd Atkins. 1993. Automated System Monitoring and Notification With Swatch. In Proceedings of the USENIX 7th System Administration Conference.

    Google Scholar 

  2. Prewett, J.E. 2003. Analyzing Cluster Log Files Using Logsurfer. In Proceedings of Annual Conference on Linu x Clusters.

    Google Scholar 

  3. Rouillard, John P. 2004. Real-Time Log File Analysis Using the Simple Event Correlator (SEC). In Proceedings of LISA XVIII, 133–149 (Print).

    Google Scholar 

  4. Dickinson, W., D. Leon, and A. Podgurski. 2001. Finding Failures by Cluster Analysis of Execution Profiles. In Proceedings of ICSE.

    Google Scholar 

  5. Vaarandi, Risto. 2003. A Data Clustering Algorithm for Mining Patterns from Event Logs. In Proceedings of the 2003 IEEE Workshop on IP Operations and Management, 119–126.

    Google Scholar 

  6. Tan, J., X. Pan, S. Kavulya, R. Gandhi, and P. Narasimhan. 2008. SALSA: Analyzing Logs as State Machines. In Proceedings of WASL.

    Google Scholar 

  7. Pei, Jian, Jiawei Han, Behzad Mortazaviasl, and Hua Zhu. 2000. Mining Access Patterns Efficiently from Web Logs. In Proceedings of the 4th Pacific-Asia Conference on Knowledge Discovery and Data Mining, 396–407.

    Google Scholar 

  8. Kotiyal, Bina, Ankit Kumar, Bhaskar Pant, R.H. Goudar, Shivali Chauhan, Sonam Junee. 2013. User Behavior Analysis in Web Log Through Comparative Study of Eclat and Apriori. In 2013 7th International Conference on Intelligent Systems and Control (ISCO), 421, 426, January 4–5, 2013.

    Google Scholar 

  9. Kaur, Manjitkaur, Urvashi Grag. 2014. ECLAT Algorithm for Frequent Itemsets Generation. International Journal of Computer Systems 01 (03). ISSN: 2394-1065.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A. S. Sundeep .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sundeep, A.S., Veena, G.S. (2018). Discovering Frequent Itemsets Over Event Logs Using ECLAT Algorithm. In: Reddy, M., Viswanath, K., K.M., S. (eds) International Proceedings on Advances in Soft Computing, Intelligent Systems and Applications . Advances in Intelligent Systems and Computing, vol 628. Springer, Singapore. https://doi.org/10.1007/978-981-10-5272-9_6

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-5272-9_6

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-5271-2

  • Online ISBN: 978-981-10-5272-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics

Navigation