计算机科学 ›› 2018, Vol. 45 ›› Issue (11A): 287-291.

• 网络与通信 • 上一篇    下一篇

基于时间、空间和规则的无线网络告警关联方法

万莹, 洪玫, 陈宇星, 王帅, 樊哲宁   

  1. 四川大学计算机学院 成都610065
  • 出版日期:2019-02-26 发布日期:2019-02-26
  • 通讯作者: 洪 玫(1963-),女,博士,教授,主要研究方向为软件工程、软件分析与测试、软件形式化验证、软件自动化测试,E-mail:hongmei@scu.edu.cn
  • 作者简介:万 莹(1993-),女,硕士,主要研究方向为软件质量保证、网络告警、软件工程

Wireless Network Alarm Correlation Based on Time,Space and Rules

WAN Ying, HONG Mei, CHEN Yu-xing, WANG Shuai, FAN Zhe-ning   

  1. College of Computer Science,Sichuan University,Chengdu 610065,China
  • Online:2019-02-26 Published:2019-02-26

摘要: 无线网络应用的普及使网络故障管理成为网络运维的关键。为了从大量的网络告警数据中快速准确地找到告警、定位根源故障,提出了一种基于时间、空间和规则的无线网络告警关联方法。该方法基于专家规则库、网络拓扑结构,以及告警的时间序列,将时间、空间、传统单一的规则告警关联方法相结合,综合定位根源告警;针对大型复杂网络结构,采用层次关联的方法,针对大型复杂网络结构,采用层次关联的方法,先找到产生告警的子网,再从该子网的节点间找到产生告警的节点;同时,通过动态维护网络拓扑结构和专家规则库,能够适应无线网络的动态变化特点。实验结果表明,提出的基于时间、空间和规则的告警关联方法的准确率为86.6%。

关键词: 告警关联, 根源告警, 规则库, 网络拓扑结构

Abstract: The generation of a wireless network alarm is caused by multiple faults that occurs over a period of time in a complex wireless network.How to find the root alarm of the root fault quickly and accurately is an important issue for network managers.This paper presented a method of wireless network alarm association based on time,space and expert rules.The method is based on rules,network topology,and time series of alarm,and the method combines the space and time with the traditional single rules alarm association method to synthetically locate the root alarm.To solve the large-scale complex network structure,the method uses a hierarchical correlation method.First it finds the subnet which generates alarm,and then locates the alarm node from subnet.At the same time,to adapt the dynamic characteristics of wireless networks,the method maintenans network topology structure and expert rule base dynamically.Experimental results demonstrate that the accuracy rate of the proposed method is 86.6%.

Key words: Alarm correlation, Network topology, Root alarms, Rule base

中图分类号: 

  • TP311
[1]CHENG M X,WU W B.Data Analytics for Fault Localization in Complex Networks[J].IEEE Internet of Things Journal,2016,3(5):1.
[2]TORAB H,HOUMAIDI M E.Alarm data correlation utilizing method for use on e.g.Internet,involves applying set of rules to correlated alarm data to identify root cause for outage and to determine whether trouble ticket will be generated for outage:USA,2008181099[P].2008-07-31.
[3]LI J,WANG H,LIU Y.Research of Fault Alarm Correlation Analysis Based on Association Rules in Communication Network[C]∥International Conference on Applied Informatics and Communication.Berlin:Springer,2010:40-48.
[4]HOU S,ZHANG X.Analysis and Research for Network Management Alarms Correlation Based on Sequence Clustering Algorithm[C]∥International Conference on Intelligent Computation Technology and Automation. IEEE, 2008:982-986.
[5]WU P H,PENG W C,CHEN M S.Mining Sequential Alarm Patterns in a Telecommunication Database[M]∥Databases in Telecommunications II.Springer Berlin Heidelberg,2001:37-51.
[6]OUH J Z,WU P H,CHEN M S.Experimental Results on a Constrained Based Sequential Pattern Mining for Telecommunication Alarm Data[C]∥International Conference on Web Information Systems Engineering.IEEE,2001:186-193.
[7]AMARAL A A,ZARPELÃO B B,MENDES L D S,et al.Infe-rence of network anomaly propagation using spatio-temporal correlation[J].Journal of Network & Computer Applications,2012,35(6):1781-1792.
[8]AWAD M,HAMDOUN H.A framework for modelling mobile radio access networks for intelligent fault management[C]∥Basic Sciences and Engineering Studies.Sudan:IEEE,2016:43-49.
[9]陈瑜,陈国龙.Wu-Manber算法性能分析及其改进[J].计算机科学,2006,33(6):203-205.
[10]GUYET T,QUINIOU R.Extracting Temporal Patterns from Interval-Based Sequences[C]∥International Joint Conference on Artificial Intelligence.Barcelona,Catalonia,Spain:ACM,2011:1306-1311.
[11]LIU P,LI X M,FENG Y Q.An algorithm of multi-level fuzzy association rules mining with multiple minimum supports in network faults diagnosis[C]∥International Conference on Natural Computation.China:IEEE,2013:884-888.
[12]QUTEISHAT A,LIM C P.A modified fuzzy min-max neural network with rule extraction and its application to fault detection and classification[J].Applied Soft Computing,2008,8(2):985-995.
[13]QADER K,MO A.Fault Classification System for Computer Networks Using Fuzzy Probabilistic Neural Network Classifier[C]∥Communications in Computer and Information Science.Germany:Springer,2014:4789-4807.
[14]MOHAMED M,H A.A Fuzzy Neural Network Fault Diagnostic System[J].International Journal of Computer Applications,2014,94(94):9-13.
[15]SARAVANAN M,JYOTHI V L.A novel approach for sequential pattern mining by using genetic algorithm[C]∥Control,Instrumentation,Communication and Computational Technologies.India:IEEE,2014:284-288.
[16]TIKUNOV D,NISHIMURA T.Automated troubleshooting of mobile networks based on alarm and performance data using bayesian networks[C]∥International Conference on Software,Telecommunications and Computer Networks.Croatia:IEEE,2008:1-5.
[1] 王文娟, 杜学绘, 任志宇, 单棣斌.
基于因果知识和时空关联的云平台攻击场景重构
Reconstruction of Cloud Platform Attack Scenario Based on Causal Knowledge and Temporal- Spatial Correlation
计算机科学, 2021, 48(2): 317-323. https://doi.org/10.11896/jsjkx.191200172
[2] 刘栅杉, 朱海龙, 韩晓霞, 穆全起, 贺维.
基于主成分回归和分层置信规则库的企业风险评估模型
Enterprise Risk Assessment Model Based on Principal Component Regression and HierarchicalBelief Rule Base
计算机科学, 2021, 48(11A): 570-575. https://doi.org/10.11896/jsjkx.201200038
[3] 刘静, 黄菊, 赖英旭, 秦华, 曾伟.
基于区块链的日志安全存储方法研究
Study on Secure Log Storage Method Based on Blockchain
计算机科学, 2020, 47(11A): 388-395. https://doi.org/10.11896/jsjkx.200400024
[4] 鲁显光, 杜学绘, 王文娟.
基于改进FP growth的告警关联算法
Alert Correlation Algorithm Based on Improved FP Growth
计算机科学, 2019, 46(8): 64-70. https://doi.org/10.11896/j.issn.1002-137X.2019.08.010
[5] 刘晓东, 魏海平, 曹宇.
考虑网络拓扑结构变化的SIRS模型的建立与稳定性分析
Modeling and Stability Analysis for SIRS Model with Network Topology Changes
计算机科学, 2019, 46(6A): 375-379.
[6] 张光兰, 杨秋辉, 程雪梅, 姜科, 王帅, 谭武坤.
序列模式挖掘在通信网络告警预测中的应用
Application of Sequence Pattern Mining in Communication Network Alarm Prediction
计算机科学, 2018, 45(11A): 535-538.
[7] 徐静,刘宴涛,夏桂阳,Y asser MORGAN.
基于网络编码的拓扑推断研究综述
Network Coding Based Topology Inference:A Survey
计算机科学, 2016, 43(Z6): 242-248. https://doi.org/10.11896/j.issn.1002-137X.2016.6A.059
[8] 徐喜荣,黄亚真,张思佳,董学智.
广义Kautz有向图GK(3,n)的反馈数的界
Feedback Numbers of Generalized Kautz Digraphs GK(3,n)
计算机科学, 2016, 43(5): 13-21. https://doi.org/10.11896/j.issn.1002-137X.2016.05.003
[9] 王韩杰,杨隆浩,傅仰耿,吴英杰,巩晓婷.
专家干预下置信规则库参数训练的差分进化算法
Differential Evolutionary Algorithm for Parameter Training of Belief Rule Base under Expert Intervention
计算机科学, 2015, 42(5): 88-93. https://doi.org/10.11896/j.issn.1002-137X.2015.05.018
[10] 徐潜,谭成翔.
基于动态权限集的Android强制访问控制模型
Mandatory Access Control Model for Android Based on Dynamic Privilege Set
计算机科学, 2015, 42(11): 191-196. https://doi.org/10.11896/j.issn.1002-137X.2015.11.040
[11] 冯定芸,于福生,王晓.
模糊规则组的谐调度
Consistency Degree of Fuzzy Rule Groups
计算机科学, 2013, 40(5): 45-47.
[12] .
基于XML的自动学习Web信息抽取

计算机科学, 2008, 35(3): 87-90.
[13] 曹宝香 夏小娜.
自适应软件过程的“服务-角色-规则”形式化模型设计

计算机科学, 2008, 35(12): 277-279.
[14] .
基于几何参数的模糊拉格朗日插值推理

计算机科学, 2007, 34(7): 200-202.
[15] .
基于搜索树的告警高效聚类算法和Bayes分类器的设计和研究

计算机科学, 2006, 33(8): 190-194.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!