Skip to main content

Improvement of Implemented Infrastructure for Streaming Outlier Detection in Big Data with ELK Stack

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 746))

Abstract

Nowadays the usage of internet is constantly increasing the amount of data. As a result the need for analyzing this data has recently emerged as we need to face a new phenomena known as the Big Data. This research is focused in finding appropriate architecture for real-time big data analytics and its main task is to detect anomalies in this real-time data. There are some tools that are used and analyzed by us in order to find the best one, but in this paper we use Timeline and compare it with Fluentd which is the tool we used in previous research [12]. Here we are going to show the reasons why Timelion is better than Fluentd. Anomaly detection in real-time big data is a problem that faces many organizations and it is a challenge for researchers as well. Our research deals with developing infrastructure for monitoring e-dnevnik (education national system in Macedonia) application server and to detect errors in order to scale up the performance. In order to enable this infrastructure to detect anomalies in streaming data we implement different algorithms for anomaly detection in Timelion. Another important thing is to know how to visualize the results. In this paper, we show the visualization of an e-dnevnik log by using Logstash, Elasticsearch, Kibana, and also how Timelion helps us to identify anomalies in real time.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    http://ednevnik.edu.mk/.

References

  1. Aggarwal, C.C.: Outlier Analysis. Springer Science+Business Media, New York (2013)

    Google Scholar 

  2. Hasani, Z., Kon-Popovska, M., Velinov, G.: Survey of technologies for real-time big data streams analytic. In: 11th International Conference on Informatics and Information Technologies, Bitola, Macedonia, 11–13 April 2014

    Google Scholar 

  3. Hasani, Z., Kon-Popovska, M., Velinov, G.: Lambda architecture for real-time big data analytic. In: ICT Innovations 2014 Web Proceedings (2014). ISSN 1857-7288

    Google Scholar 

  4. Hasani, Z.: Performance comparison throws running job in Hadoop by defining the number of maps and reduces. In: 12th International Conference on Informatics and Information Technologies 2015, Bitola, Macedonia, 24–26 April 2015

    Google Scholar 

  5. Hasani, Z.: Virtuoso, system for saving semantic data. In: 12th International Conference on Informatics and Information Technologies 2015, Bitola, Macedonia, 24–26 April 2015

    Google Scholar 

  6. Hasani, Z.: Robust anomaly detection algorithms for real-time big data: comparison of algorithms. In: 6th Mediterranean Conference on Embedded Computing (MECO). IEEE (2017)

    Google Scholar 

  7. Bitnami. https://docs.bitnami.com/virtual-machine/apps/elk/. Accessed 02 July 2017

  8. Kibana Timelion - Anomaly Detection, 18 January 2017. https://rmoff.net/2017/01/18/kibana-timelion-anomaly-detection/. Accessed 28 July 2017

  9. Timelion. https://www.elastic.co/guide/en/kibana/current/timelion.html. Accessed 28 July 2017

  10. Hasani, Z., Jakimovski, B., Kon-Popovska, M., Velinov, G.: Real-time analytics of SQL queries based on log analytic. In: ICT Innovations 2015 Web Proceedings (2015). http://proceedings.ictinnovations.org/attachment/conference/12/ict-innovations-2015-web-proceedings.pdf. ISSN 1857–7288

  11. Tamura, K.: Elasticsearch, Fluentd, and Kibana: Open Source Log Search and Visualization. https://www.digitalocean.com/community/tutorials/elasticsearch-fluentd-and-kibana-open-source-log-search-and-visualization. Accessed 7 Jan 2016

  12. Hasani, Z.: Implementation of infrastructure for streaming outlier detection in big data. In: Rocha, Á., Correia, A., Adeli, H., Reis, L., Costanzo, S. (eds.) Recent Advances in Information Systems and Technologies, WorldCIST 2017. Advances in Intelligent Systems and Computing, vol. 570. Springer, Cham (2017)

    Google Scholar 

  13. Kibana Timelion - Anomaly Detection, 18 January 2017. https://rmoff.net/2017/01/18/kibana-timelion-anomaly-detection/. Accessed 05 July 2017

  14. Timelion. https://www.elastic.co/guide/en/kibana/current/timelion.html. Accessed 12 July 2017

  15. Comparison between Fluentd and Logstash. https://logz.io/blog/fluentd-logstash/. Accessed 20 Sept 2017

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Zirije Hasani or Jakup Fondaj .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Hasani, Z., Fondaj, J. (2018). Improvement of Implemented Infrastructure for Streaming Outlier Detection in Big Data with ELK Stack. In: Rocha, Á., Adeli, H., Reis, L., Costanzo, S. (eds) Trends and Advances in Information Systems and Technologies. WorldCIST'18 2018. Advances in Intelligent Systems and Computing, vol 746. Springer, Cham. https://doi.org/10.1007/978-3-319-77712-2_82

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-77712-2_82

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-77711-5

  • Online ISBN: 978-3-319-77712-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics