Abstract: System log analysis is one of the most important ways to defend attacks and avoid system exceptions. However, rule-based log anomaly detection cannot meet the requirements of complex systems ...