Logo PTI Logo FedCSIS

Proceedings of the 17th Conference on Computer Science and Intelligence Systems

Annals of Computer Science and Information Systems, Volume 30

Discovering interactions between applications with log analysis


DOI: http://dx.doi.org/10.15439/2022F172

Citation: Proceedings of the 17th Conference on Computer Science and Intelligence Systems, M. Ganzha, L. Maciaszek, M. Paprzycki, D. Ślęzak (eds). ACSIS, Vol. 30, pages 861869 ()

Full text

Abstract. Application logs record the behavior of a system during its runtime and their analysis can provide useful information. In this article, we propose a method of automated log analysis to discover interactions taking place between applications in an enterprise. We believe that such an automated approach can greatly support enterprise architects in building an up-to-date view of a governed system in a modern, fast-paced development environment. Our contribution is the following: we propose a new method for log template generation called SLT (Simple Log Template), we propose a method of extracting knowledge about application interactions from logs, and we validate the proposed methods on a real system running at Nordea Bank. Additionally, we collect statistical information about application logs from the real-life system, based on which we formulate some observations that support our method.


  1. L. Korzeniowski and K. Goczyla, “Landscape of Automated Log Analysis: A Systematic Literature Review and Mapping Study,” IEEE Access, vol. 10, pp. 21892–21913, 2022.
  2. H. Labbaci, B. Medjahed, and Y. Aklouf, “Learning interactions from web service logs,” Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 10439 LNCS, no. August, pp. 275–289, 2017.
  3. E. U. Aktas, M. C. Calpur, U. U. Yildirim, and E. Yıldırım, “Inferring dependencies among web services with predictive and statistical analysis of system logs,” CEUR Workshop Proc., vol. 2291, no. December, pp. 235–244, 2018.
  4. J. G. Lou, Q. Fu, Y. Wang, and J. Li, “Mining dependency in distributed systems through unstructured logs analysis,” Oper. Syst. Rev., vol. 44, no. 1, pp. 91–96, 2010.
  5. Q. Fu et al., “Where do developers log? an empirical study on logging practices in industry,” 2014, pp. 24–33.
  6. D. Yuan, S. Park and Y. Zhou, "Characterizing logging practices in open-source software," 2012 34th International Conference on Software Engineering (ICSE), 2012, pp. 102-112, http://dx.doi.org/10.1109/ICSE.2012.6227202.
  7. B. Chen and Z. M. (Jack) Jiang, “Characterizing logging practices in Java-based open source software projects – a replication study in Apache Software Foundation,” Empir. Softw. Eng., vol. 22, no. 1, pp. 330–374, Feb. 2017.
  8. M. Leemans, W. M. P. Van Der Aalst, and M. G. J. Van Den Brand, “Recursion aware modeling and discovery for hierarchical software event log analysis,” 25th IEEE Int. Conf. Softw. Anal. Evol. Reengineering, SANER 2018 - Proc., vol. 2018-March, no. March, pp. 185–196, 2018.
  9. G. Qi, W. T. Tsai, W. Li, Z. Zhu, and Y. Luo, “A cloud-based triage log analysis and recovery framework,” Simul. Model. Pract. Theory, vol. 77, no. August 2020, pp. 292–316, 2017.
  10. I. Beschastnikh, Y. Brun, M. D. Ernst, and A. Krishnamurthy, “Inferring models of concurrent systems from logs of their behavior with CSight,” 2014, pp. 468–479.
  11. R. Vaarandi and M. Pihelgas, “LogCluster - A data clustering and pattern mining algorithm for event logs,” Proc. 11th Int. Conf. Netw. Serv. Manag. CNSM 2015, pp. 1–7, 2015.
  12. P. He, J. Zhu, Z. Zheng, and M. R. Lyu, “Drain: An Online Log Parsing Approach with Fixed Depth Tree,” Proc. - 2017 IEEE 24th Int. Conf. Web Serv. ICWS 2017, pp. 33–40, 2017.
  13. J. T. Hancock and T. M. Khoshgoftaar, “Survey on categorical data for neural networks,” J. Big Data, vol. 7, no. 1, 2020.
  14. J. Zhu et al., “Tools and Benchmarks for Automated Log Parsing,” Proc. - 2019 IEEE/ACM 41st Int. Conf. Softw. Eng. Softw. Eng. Pract. ICSE-SEIP 2019, pp. 121–130, 2019.