Network Alarm Analysis Based on Data Mining and LSTM
Abstract
References
Index Terms
- Network Alarm Analysis Based on Data Mining and LSTM
Recommendations
Mining Alarm Database of Telecommunication Network for Alarm Association Rules
PRDC '05: Proceedings of the 11th Pacific Rim International Symposium on Dependable ComputingSome alarm correlation rules were discovered from the alarm databases of telecommunication network management systems by using technology of association rule mining and alarm sequence analysis. The generation and the release information of alarms was ...
Similarity detection method of abnormal data in network based on data mining
Special Section: Fuzzy Logic for Analysis of Clinical Diagnosis and Decision-Making in Health CareWith the continuous progress of network technology, some abnormal data are often confused in network data flow, which affects network security. In order to grasp the abnormal degree of abnormal data in networks and detect the similarity of abnormal data, ...
Identifying false alarm for network intrusion detection system using data mining and decision tree
DNCOCO'08: Proceedings of the 7th conference on Data networks, communications, computersAlthough an intelligent intrusion and detection strategies are used to detect any false alarms within network critical segments of network infrastructures, reducing false positives are still being a major challenges. Up to this moment, these strategies ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 158Total Downloads
- Downloads (Last 12 months)5
- Downloads (Last 6 weeks)1
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in