Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1619258.1619272acmconferencesArticle/Chapter ViewAbstractPublication PagesdebsConference Proceedingsconference-collections
research-article

Tuning complex event processing rules using the prediction-correction paradigm

Published: 06 July 2009 Publication History

Abstract

There is a growing need for the use of active systems, systems that act automatically based on events. In many cases, providing such active functionality requires materializing (inferring) the occurrence of relevant events. A widespread paradigm for enabling such materialization is Complex Event Processing (CEP), a rule based paradigm, which currently relies on domain experts to fully define the relevant rules. These experts need to provide the set of basic events which serves as input to the rule, their inter-relationships, and the parameters of the events for determining a new event materialization. While it is reasonable to expect that domain experts will be able to provide a partial rules specification, providing all the required details is a hard task, even for domain experts. Moreover, in many active systems, rules may change over time, due to the dynamic nature of the domain. Such changes complicate even further the specification task, as the expert must constantly update the rules. As a result, we seek additional support to the definition of rules, beyond expert opinion. This work presents a mechanism for automating both the initial definition of rules and the update of rules over time. This mechanism combines partial information provided by the domain expert with machine learning techniques, and is aimed at improving the accuracy of event specification and materialization. The proposed mechanism consists of two main repetitive stages, namely rule parameter prediction and rule parameter correction. The former is performed by updating the parameters using an available expert knowledge regarding the future changes of parameters. The latter stage utilizes expert feedback regarding the actual past occurrence of events and the events materialized by the CEP framework to tune rule parameters. We also include possible implementations for both stages, based on a statistical estimator and evaluate our outcome using a case study from the intrusion detection domain.

References

[1]
A. Adi and O. Etzion. Amit - the situation manager. The International Journal on Very Large Data Bases, 13(2):177--203, May 2004.
[2]
R. Ammon, C. Emmersberger, T. Greiner, A. Paschke, F. Springer, and C. Wolff. Event-driven business process management. In Proceedings of the 2nd International Conference on Distributed Event-Based Systems (DEBS'08), Rome, Italy, July 2008.
[3]
K. Anderson, A. Carzaniga, D. Heimbigner, and A. Wolf. Event-based document sensing for insider threats. Technical report, Department of Computer Science, University of Colorado, Boulder, Colorado, Feb. 2004.
[4]
S. Axelsson. Intrusion detection systems. a survey and taxonomy. Technical report, 2000.
[5]
M. Balazinska, N. Khoussainova, and D. Suciu. PEEX: Extracting probabilistic events from rfid data. In Proceedings of the IEEE CS International Conference on Data Engineering, Cancun, Mexico, 2008.
[6]
M. Bauer and K. Rothermel. An architecture for observing physical world events. In 11th International Conference on Parallel and Distributed Systems (ICPADS 2005), pages 377--383, Fuduoka, Japan, July 2005.
[7]
R. Blanco, J. Wang, and P. Alencar. A metamodel for distributed event based systems. In DEBS '08: Proceedings of the second international conference on Distributed event-based systems, pages 221--232, New York, NY, USA, 2008. ACM.
[8]
P.-T. D. Boer, D. Kroese, S. Mannor, and R. Rubinstein. A tutorial on the cross-entropy method. Annals of Operations Research, 134(1):19--67, 1997.
[9]
M. Campbell, C.-S. Li, C. Aggarwal, M. Naphade, K.-L. Wu, and T. Zhang. An evaluation of over-the-counter medication sales for syndromic surveillance. In IEEE International Conference on Data Mining - Life Sciences Data Mining Workshop, 2004.
[10]
S. Chakravarthy and D. Mishra. Snoop: An expressive event specification language for active databases. Data Knowl. Eng., 14(1):1--26, 1994.
[11]
H. Chen, J. Yin, L. Jin, Y. Li, and J. Dong. Jtang synergy: A service oriented architecture for enterprise application integration. In Proceedings of the 11th International Conference on Computer Supported Cooperative Work in Design (CSCWD 2007), pages 502--507, Melbourne, Australia, Apr. 2007.
[12]
D. Chu, A. Deshpande, J. Hellerstein, and W. Hong. Approximate data collection in sensor networks using probabilistic models. In Proceedings of the IEEE CS International Conference on Data Engineering, page 48, 2006.
[13]
M. Cilia, C. Bornh ovd, and A. Buchmann. Event handling for the universal enterprise. Information Technology and Management -- Special Issue on Universal Enterprise Integration, 5(1):123--148, Jan. 2005.
[14]
G. Cugola, E. D. Nitto, and A. Fuggetta. The jedi event-based infrastructure and its application to the development of the opss wfms. Transaction of Software Engineering (TSE), 27(9), Sep 2001.
[15]
A. Demers, J. Gehrke, B. Panda, M. Riedewald, V. Sharma, and W. White. Cayuga: A general purpose event monitoring system. In CIDR 2007, Third Biennial Conference on Innovative Data Systems Research, pages 412--422, Asilomar, CA, USA, Jan. 2007. www.crdrdb.org.
[16]
O. Diaz, A. Jaime, and N. Paton. Dear: a debugger for active rules in an object-oriented context. In Proceedings of the 1st International Workshop on Rules in Database Systems, pages 180--193, Aug 1993.
[17]
C. Elkan. Results of the kdd'99 classifier learning. SIGKDD Explor. Newsl., 1(2):63--64, 2000.
[18]
A. Gal and E. Hadar. Generic architecture of complex event processing systems. In A. Hinze and A. Buchmann, editors, Handbook of Research on Advanced Distributed Event-Based Systems, Publish/Subscribe and Message Filtering Technologies. IGI Global, 2009.
[19]
A. Gelb, editor. Applied Optimal Estimation. MIT Press, Cambridge, MA, 1974.
[20]
D. Georgakopoulos, D. Baker, M. Nodine, and A. Cichoki. Event-driven video awareness providing physical security. World Wide Web, 10(1):85--109, 2007.
[21]
F. Glover and M. Laguna. Tabu Search. Kluwer, Norwell, MA., 1997.
[22]
K. Gomadam, A. Ranabahu, L. Ramaswamy, A. Sheth, and K. Verma. A semantic framework for identifying events in a service oriented architecture. In IEEE International Conference on Web Services (ICWS 2007), pages 545--552, Salt Lake City, Utah, USA, July 2007.
[23]
A. Hinze and A. Buchmann, editors. Handbook of Research on Advanced Distributed Event-Based Systems, Publish/Subscribe and Message Filtering Technologies. IGI Global, 2009.
[24]
R. Kalman. A new approach to linear filtering and prediction problems. Journal of Basic Engineering, 82(1):35--45, 1960.
[25]
C. Kruegel, D. Mutz, W. Robertson, and F. Valeur. Bayesian event classification for intrusion detection. In Proceedings of the 19th Annual Computer Security Applications Conference, 2003.
[26]
L. Labs. Darpa intrusion detection evaluation, 1999.
[27]
D. Luckham. The Power of Events: An Introduction to Complex Event Processing in Distributed Enterprise Systems. Addison-Wesley, 2002.
[28]
J. McHugh. Intrusion and Intrusion Detection. 2001.
[29]
M. Panda and M. R. Patra. Network intrusion detection using naive bayes. IJCSNS International Journal of Computer Science and Network Security, 7(12), December 2007.
[30]
P. R. Pietzuch, B. Shand, and J. Bacon. Composite event detection as a generic middleware extension. IEEE Network, 18(1):44--55, 2004.
[31]
R. Puttini, Z. Marrakchi, and L. Mé. A bayesian classification model for real-time intrusion detection. In 22th International Workshop on Bayesian Inference and Maximum Entropy Methods in Science and Engineering, 2002.
[32]
A. Sebyala, T. Olukemi, and L. Sacks. Active platform security through intrusion detection using nave bayesian network for anomaly detection. In In London Communication Symposium, 2002.
[33]
A. Valdes and K. Skinner. Adaptive, model-based monitoring for cyber attack detection. In In Preceedings of the IEEE Symposium of Security and Privacy, 1991.
[34]
N. Vijayakumar and B. Plale. Prediction of missing events in sensor data streams using kalman filters. In Proceedings of the 1st Int'l Workshop on Knowledge Discovery from Sensor Data, in conjunction with ACM 13th Int'l Conference on Knowledge Discovery and Data Mining, Aug. 2007.
[35]
S. Wasserkrug, A. Gal, and O. Etzion. Inference of security hazards from event composition based on incomplete or uncertain information. IEEE Transactions on Knowledge and Data Engineering (TKDE), 20(8), Aug. 2008.
[36]
S. Wasserkrug, A. Gal, O. Etzion, and Y. Turchin. Complex event processing over uncertain data. In Proceedings of the 2nd International Conference on Distributed Event-Based Systems (DEBS '2008), Rome, Italy, 2008.
[37]
S. White, A. Alves, and D. Rorke. Weblogic event server: a lightweight, modular application server for event processing. In Proceedings of the Second International Conference on Distributed Event-Based Systems (DEBS 2008), pages 193--200, Rome, Italy, July 2008.
[38]
G. Wittenburg, K. Terfloth, F. L. Villafuerte, T. Naumowicz, H. Ritter, and J. Schiller. Fence monitoring experimental evaluation of a use case for wireless sensor networks. In Proceedings of the 4th European Conference on Wireless Sensor Networks (EWSN'07), Delft, The Netherlands, Jan. 2007.

Cited By

View all
  • (2024) Rule based complex event processing for IoT applications: Review, classification and challenges Expert Systems10.1111/exsy.13597Online publication date: 30-Mar-2024
  • (2023)Learning Ship Activity Patterns in Maritime Data Streams: Enhancing CEP Rule Learning by Temporal and Spatial Relations and Domain-Specific FunctionsIEEE Transactions on Intelligent Transportation Systems10.1109/TITS.2023.328224624:10(11384-11395)Online publication date: Oct-2023
  • (2023)A Survey of Event Detection Techniques in Intelligent IoT System2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT)10.1109/ICCCNT56998.2023.10307841(1-6)Online publication date: 6-Jul-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
DEBS '09: Proceedings of the Third ACM International Conference on Distributed Event-Based Systems
July 2009
292 pages
ISBN:9781605586656
DOI:10.1145/1619258
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 06 July 2009

Permissions

Request permissions for this article.

Check for updates

Author Tag

  1. complex event processing

Qualifiers

  • Research-article

Conference

DEBS '09

Acceptance Rates

Overall Acceptance Rate 145 of 583 submissions, 25%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)6
  • Downloads (Last 6 weeks)1
Reflects downloads up to 26 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2024) Rule based complex event processing for IoT applications: Review, classification and challenges Expert Systems10.1111/exsy.13597Online publication date: 30-Mar-2024
  • (2023)Learning Ship Activity Patterns in Maritime Data Streams: Enhancing CEP Rule Learning by Temporal and Spatial Relations and Domain-Specific FunctionsIEEE Transactions on Intelligent Transportation Systems10.1109/TITS.2023.328224624:10(11384-11395)Online publication date: Oct-2023
  • (2023)A Survey of Event Detection Techniques in Intelligent IoT System2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT)10.1109/ICCCNT56998.2023.10307841(1-6)Online publication date: 6-Jul-2023
  • (2022)Bat4CEP: a bat algorithm for mining of complex event processing rulesApplied Intelligence10.1007/s10489-022-03256-252:13(15143-15163)Online publication date: 11-Mar-2022
  • (2022)Uncertainty in StreamsEncyclopedia of Big Data Technologies10.1007/978-3-319-63962-8_332-2(1-9)Online publication date: 15-Jun-2022
  • (2020)Spatiotemporal event detection: a reviewInternational Journal of Digital Earth10.1080/17538947.2020.173856913:12(1339-1365)Online publication date: 9-Mar-2020
  • (2019)Learning of complex event processing rules with genetic programmingExpert Systems with Applications: An International Journal10.1016/j.eswa.2019.04.007129:C(186-199)Online publication date: 1-Sep-2019
  • (2019)Uncertainty in StreamsEncyclopedia of Big Data Technologies10.1007/978-3-319-77525-8_332(1738-1746)Online publication date: 20-Feb-2019
  • (2018)Enhanced Complex Event Processing Framework for Geriatric Remote HealthcareHandbook of Research on Investigations in Artificial Life Research and Development10.4018/978-1-5225-5396-0.ch016(348-379)Online publication date: 2018
  • (2018)Real-Time Intrusion Detection in Network Traffic Using Adaptive and Auto-Scaling Stream Processor2018 IEEE Global Communications Conference (GLOBECOM)10.1109/GLOCOM.2018.8647489(1-6)Online publication date: Dec-2018
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media