Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3375998.3376023acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicnccConference Proceedingsconference-collections
research-article

Network Alarm Analysis Based on Data Mining and LSTM

Published: 28 January 2020 Publication History

Abstract

Network alarms are becoming more and more complex, and the scale is increasing sharply. When the root alarm is generated by the devices, a lot of redundant alarms are often triggered. The traditional processing mode is difficult to find the root alarm and filter out the redundant alarm. We provide a new analysis method based on data mining and long short-term memory(LSTM) to find the root alarm and to filter out the redundant alarm.

References

[1]
Hu, W., Chen, T., & Shah, S. (2017). Cause and Effect Analysis for Decision Support in Alarm Floods. International Federation of Automatic Control, 50-1 (2017) 13940--13945.
[2]
Kim, D. S., Shinbo, H., Yokota, H. (2011). An Alarm Correlation Algorithm for Network Management Based on Root Cause Analysis.
[3]
Lewis, L., 1995. Managing Computer Networks: A Case-Based Reasoning Approach. Artech House, Inc., Norwood, MA, USA, p. 3802.
[4]
Steindera, M., Sethi, A.S., 2004. A survey of fault localization techniques in computer networks. Sci. Comput. Programm. 53, 165--194.
[5]
Zheng, Q., Qian, Y., (2005). An event correlation approach based on the combination of IHU and codebook. Lecture Notes Comput. Sci. 3802, 757--763.
[6]
Kabiri, P., Ghorbani, Ali A., 2007. A rule-based temporal alert correlation system. Int.J. Netw. Secur. 5, 66--72.
[7]
Al-Mamory, S., Zhang, H. Intrusion detection alarms reduction using root cause analysis and clustering.
[8]
Julisch, K. (2003). Clustering intrusion detection alarms to support root cause analysis, ACM Transaction on Information and System Security 6 (2003) 443--471.
[9]
Perdisci, R., Giacinto, G., Roli, F. (2006). Alarm clustering for intrusion detection systems in computer networks, Journal of Engineering Application of Artificial Intelligence 19 (2006) 429--438.
[10]
Ester, M., Kriegel, H.P., Sander, J., Xu, X. (1996). A density-based algorithm for discovering clusters in large spatial databases with noise. Proceedings of the Second International Conference on Knowledge Discovery and Data Mining, Portland, Oregon (1996), pp. 226--231.
[11]
De Oliveira, D.P., Garrett Jr., J.H., Soibelman, L. (2011). A density-based spatial clustering approach for defining local indicators of drinking water distribution pipe breakage. Advanced Engineering Informatics, 25 (2011), pp. 380--389.
[12]
Sundermeyer, M., Schluter, R., Ney, H., (2012). LSTM Neural Networks for Language Modeling.
[13]
Graves, A., Schmidhuber, J. Frame-wise Phoneme Classification with Bidirectional LSTM and Other Neural Network Architectures", Neural Networks, Vol. 18, Issue 5--6, 2005, pp. 602--610.
[14]
Gears, F. A., Schmidhuber, J., Cummins, F. (1999). Learning to Forget: Continual Prediction with LSTM. Technical Report IDSIA-01-99, IDSIA, Lugano, CH.
[15]
Lin, T., Horne, B. G., Tino, P., Giles, C. L. (1996). Learning long-term dependencies in NARX recurrent neural networks. IEEE Transactions on Neural Networks.
[16]
Mozer, M. C. (1993). Neural net architectures for temporsal sequences processing. In Weigend, A. S. and Gershenfeld, N. A., editors, Time series prediction: Forecasting the future and understanding the past, Addison Wesley, Reading, MA.
[17]
https://blog.csdn.net/gzj_1101/article/details/79376798
[18]
https://blog.csdn.net/zhangbaoanhadoop/article/details/81952284

Index Terms

  1. Network Alarm Analysis Based on Data Mining and LSTM

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICNCC '19: Proceedings of the 2019 8th International Conference on Networks, Communication and Computing
    December 2019
    263 pages
    ISBN:9781450377027
    DOI:10.1145/3375998
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 28 January 2020

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Data Mining
    2. Long Short-term Memory(LSTM)
    3. Network Alarm
    4. Redundant Alarm
    5. Root Alarm

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    ICNCC 2019

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 158
      Total Downloads
    • Downloads (Last 12 months)5
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 16 Nov 2024

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media