Published on: May 2026
ANOMALY DETECTION IN DISTRIBUTED FILE SYSTEM LOGS USING HYBRID MACHINE LEARNING AND DEEP LEARNING MODELS
Hema M S Aliasgar Abbas Ringnodwala Chatura J S Chirag Ananda Kumar Dhruv Mishra
Karnataka India
Article Status
Available Documents
Abstract
Keywords—System log file Analysis; Anomaly Detection; Hybrid Machine Learning; Deep Learning; Log-based Monitoring; Random Forest; BiLSTM(Ensemble); DeepLog(Ensemble); SMOTE (Class Imbalance); Precision-Recall AUC (PR-AUC).
How to Cite this Paper
S, H. M., Ringnodwala, A. A., S, C. J., Kumar, C. A. & Mishra, D. (2026). Anomaly Detection in Distributed File System Logs Using Hybrid Machine Learning and Deep Learning Models. International Journal of Creative and Open Research in Engineering and Management, <i>02</i>(05). https://doi.org/10.55041/ijcope.v2i4.995
S, Hema, et al.. "Anomaly Detection in Distributed File System Logs Using Hybrid Machine Learning and Deep Learning Models." International Journal of Creative and Open Research in Engineering and Management, vol. 02, no. 05, 2026, pp. . doi:https://doi.org/10.55041/ijcope.v2i4.995.
S, Hema,Aliasgar Ringnodwala,Chatura S,Chirag Kumar, and Dhruv Mishra. "Anomaly Detection in Distributed File System Logs Using Hybrid Machine Learning and Deep Learning Models." International Journal of Creative and Open Research in Engineering and Management 02, no. 05 (2026). https://doi.org/https://doi.org/10.55041/ijcope.v2i4.995.
References
[1]R. Vaarandi, “A Data Clustering Algorithm for Mining Patterns from Event Logs,” in Proc. IEEE Workshop on IP Operations and Management (IPOM), 2003.[2]M.-L. Shyu, S.-C. Chen, K. Sarinnapakorn, and L. Chang, “A Novel Anomaly Detection Scheme Based on Principal Component Classifier,” in Proc. IEEE Foundations and New Directions of Data Mining Workshop, 2003.
[3]W. Xu, L. Huang, A. Fox, D. A. Patterson, and M. I. Jordan, “Detecting Large-Scale System Problems by Mining Console Logs,” in Proc. ACM SIGOPS Symposium on Operating Systems Principles (SOSP), 2009.
[4]M. Du, F. Li, G. Zheng, and V. Srikumar, “DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning,” in Proc. ACM SIGSAC Conference on Computer and Communications Security (CCS), 2017.
[5]P. He, J. Zhu, Z. Zheng, and M. R. Lyu, “Drain: An Online Log Parsing Approach with Fixed Depth Tree,” in Proc. IEEE International Conference on Web Services (ICWS), 2017.
[6]K. Zhang, J. Xu, M. Min, et al., “LogAnomaly: Unsupervised Detection of Sequential and Quantitative Anomalies in Unstructured Logs,” in Proc. International Joint Conference on Artificial Intelligence (IJCAI), 2019.
[7]J. Zhu, S. He, P. He, J. Liu, and M. R. Lyu, “LogHub: A Large Collection of System Log Datasets for AI-Driven Log Analytics,” arXiv preprint arXiv:2008.06448, 2020.
[8]Y. Alaca, E. Başaran, and Y. Çelik, “Enhancing Anomaly Detection in Large-Scale Log Data Using Machine Learning: A Comparative Study of SVM and KNN Algorithms with HDFS Dataset,” Empirical Software Engineering, 2024.
Ethical Compliance & Review Process
- •All submissions are screened under plagiarism detection.
- •Review follows editorial policy.
- •Authors retain copyright.
- •Peer Review Type: Double-Blind Peer Review
- •Published on: May 02 2026
This article is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License. You are free to share and adapt this work for non-commercial purposes with proper attribution.

