Research Article

A Log-Based Anomaly Detection Method with Efficient Neighbor Searching and Automatic K Neighbor Selection

Table 6

Comparison of the overall searching time(s).

Dimension30100300100
Data size1 G10 M100 M1 G

LibertyOur method12.3827.3435.020.2812.24327.34
Traditional kNN78.39171.98336.362.6321.05171.98

BGLOur method11.0921.5233.420.2792.54621.52
Traditional kNN35.01103.35198.461.6813.18103.35

ThunderbirdOur method13.7128.2529.340.2732.03728.25
Traditional kNN114.68236.26440.973.227.29236.26

SpiritOur method12.6330.2834.580.2541.89930.28
Traditional kNN112.21247.79463.873.1427.33247.79

HDFSOur method6.1619.7923.150.1811.3219.79
Traditional kNN82.08177.69320.462.5120.99177.69

ZookeeperOur method8.0117.4921.760.2241.6817.49
Traditional kNN86.29197.25366.992.7923.5197.25