ϩάͷछྨʢ㲈ϑΥʔϚοτʣͷࣗಈఆख๏ • AprioriΞϧΰϦζϜͷԠ༻[4] • Shortest Edit ScriptΛͬͨख๏[5] [1] Min Du, Feifei Li, Guineng Zheng, and Vivek Srikumar. Deeplog: Anomaly detection and diagnosis from system logs through deep learning. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Commu- nications Security, CCS ’17, pp. 1285–1298, New York, NY, USA, 2017. ACM. [2] Siadati, H., & Memon, N. (2017). Detecting Structurally Anomalous Logins Within Enterprise Networks. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security - CCS ’17(pp. 1273–1284). [3] Xu, W., Huang, L., Fox, A., Patterson, D., & Jordan, M. (2009). Online system problem detection by mining patterns of console logs. In Proceedings - IEEE International Conference on Data Mining, ICDM. https://doi.org/10.1109/ICDM.2009.19 [4] Risto Vaarandi. A data clustering algorithm for mining patterns from event logs. in IEEE IPOM’03 Proceed- ings, pp. 119–126, 2003 [5] Min Du and Feifei Li. Spell: Streaming parsing of system event logs. In Proceedings - 16th IEEE International Conference on Data Mining, ICDM 2016, pp. 859–864, United States, 1 2017. Institute of Electrical and Electronics Engineers Inc.