Computer Science ›› 2020, Vol. 47 ›› Issue (6A): 440-443.doi: 10.11896/JsJkx.190600173

• Database & Big Data & Data Science • Previous Articles     Next Articles

Novel Clustering Algorithm Based on Timing-featured Alarms

DENG Tian-tian1, 2, XIONG Yin-qiao1, 2 and HE Xian-hao2   

  1. 1 College of Electronic and Communication Engineering,Changsha University,Changsha 410022,China
    2 College of Computer,National University of Defense and Technology,Changsha 410073,China
  • Published:2020-07-07
  • About author:DENG Tian-tian, Ph.D, senior engineer. Her research interests include big data analysis and open source ecology.
    XIONG Yin-qiao, Ph.D.His research interests include privacy preserving, information security, and the Internet of Things.
  • Supported by:
    This work was supported by the National Natural Science Foundation of China(61972058),Natural Science Foundation of Hunan Province(2020JJ5621) and Science and Technology Planning ProJect of Changsha (ZD1601042,K1705031).

Abstract: In the cloud environment,large-scale cluster equipments will generate massive timing-featured alarms.In the practical application,operational personnel generally uses these alarms to locate,check and repair the faults and errors,and maintains the normal operation of the systems.So how to efficiently cluster the alarms and mine the key information will be core issues to keep continuous and stable operation of the cloud.Therefore,this paper proposes a novel clustering algorithm based on timing featured alarms.The algorithm constructs a new relation matrix by utilizing time difference between any two alarms in the given time window,then takes advantage of K-means algorithm to cluster the column vectors in the relation matrix,to get the cluster result of alarms.Experiment result shows that the algorithm can cluster massive alarms efficiently.

Key words: Alarms, Cluster, Data mining, Timing feature

CLC Number: 

  • TP274
[1] KICIMAN E,FOX A.Detecting and localizing anomalous behavior to discover failures in component-based internet services .Technical Report,Stanford,2004.
[2] 王肇刚.基于网络拓扑约束的时序数据挖掘算法研究与应用.北京:北京邮电大学,2009.
[3] HAN J W,KAMBER M.数据挖掘概念与技术(原书第2版)(计算机科学丛书).北京:机械工业出版社,2008.
[4] AGRAWAI R.Mining association rules between sets of items in large databases//Proceedings of the 1993 ACM SIGMOD Conference.Washington,D C,1993:207-216.
[5] HAN J,PEI J,YIN Y.Mining frequent patterns without candidate generation//ACM SIGMOD International Conference on Management of Data.ACM,2000:1-12.
[6] HATONEN K.Knowledge discovery from telecommunication network alarm databases//ICDE 96.New Orieans,1996:115-122.
[7] NING P,CUI Y,REEVES D S,et al.Techniques and tools for analyzing intrusion alerts.ACM Transactions on Information and System Security(TISSEC),2004,7(2):274-318.
[8] 刘冬生,曾小荟,唐卫东,等.一种新的告警关联聚类算法.计算机应用研究,2013,30(12):3786-3789,3793.
[9] 陈兴蜀,何涛,曾雪梅, 等.基于告警属性聚类的攻击场景关联规则挖掘方法研究.工程科学与技术,2019,51(3):144-150.
[10] 樊迪,刘静,庄俊玺, 等.基于因果知识发现的攻击场景重构研究.网络与信息安全学报,2017,3(4):58-68.
[11] 冯学伟,王东霞,黄敏桓, 等.一种基于马尔可夫性质的因果知识挖掘方法.计算机研究与发展,2014,51(11):2493-2504.
[12] KHOSRAVI-FARMAD M,RAMAKI A A,BAFGHI A G.Risk-based Intrusion Response Management in IDS using Bayesian Decision Networks//2015 5th International Conference on Computer and Kknowledge Engineering(ICCKE).2015:307-312.
[13] RAMAKI A A,RASOOLZADEGAN A ,BAFGHI A G.A Systematic Mapping Study on Intrusion Alert Analysis in Intrusion Detection Systems.ACM Computing Surveys,2018,51(3):55.
[1] CHAI Hui-min, ZHANG Yong, FANG Min. Aerial Target Grouping Method Based on Feature Similarity Clustering [J]. Computer Science, 2022, 49(9): 70-75.
[2] LU Chen-yang, DENG Su, MA Wu-bin, WU Ya-hui, ZHOU Hao-hao. Federated Learning Based on Stratified Sampling Optimization for Heterogeneous Clients [J]. Computer Science, 2022, 49(9): 183-193.
[3] LI Rong-fan, ZHONG Ting, WU Jin, ZHOU Fan, KUANG Ping. Spatio-Temporal Attention-based Kriging for Land Deformation Data Interpolation [J]. Computer Science, 2022, 49(8): 33-39.
[4] LIU Li, LI Ren-fa. Control Strategy Optimization of Medical CPS Cooperative Network [J]. Computer Science, 2022, 49(6A): 39-43.
[5] TIAN Zhen-zhen, JIANG Wei, ZHENG Bing-xu, MENG Li-min. Load Balancing Optimization Scheduling Algorithm Based on Server Cluster [J]. Computer Science, 2022, 49(6A): 639-644.
[6] LU Chen-yang, DENG Su, MA Wu-bin, WU Ya-hui, ZHOU Hao-hao. Clustered Federated Learning Methods Based on DBSCAN Clustering [J]. Computer Science, 2022, 49(6A): 232-237.
[7] YU Shu-hao, ZHOU Hui, YE Chun-yang, WANG Tai-zheng. SDFA:Study on Ship Trajectory Clustering Method Based on Multi-feature Fusion [J]. Computer Science, 2022, 49(6A): 256-260.
[8] MAO Sen-lin, XIA Zhen, GENG Xin-yu, CHEN Jian-hui, JIANG Hong-xia. FCM Algorithm Based on Density Sensitive Distance and Fuzzy Partition [J]. Computer Science, 2022, 49(6A): 285-290.
[9] CHEN Jing-nian. Acceleration of SVM for Multi-class Classification [J]. Computer Science, 2022, 49(6A): 297-300.
[10] CHEN Jia-zhou, ZHAO Yi-bo, XU Yang-hui, MA Ji, JIN Ling-feng, QIN Xu-jia. Small Object Detection in 3D Urban Scenes [J]. Computer Science, 2022, 49(6): 238-244.
[11] Ran WANG, Jiang-tian NIE, Yang ZHANG, Kun ZHU. Clustering-based Demand Response for Intelligent Energy Management in 6G-enabled Smart Grids [J]. Computer Science, 2022, 49(6): 44-54.
[12] XING Yun-bing, LONG Guang-yu, HU Chun-yu, HU Li-sha. Human Activity Recognition Method Based on Class Increment SVM [J]. Computer Science, 2022, 49(5): 78-83.
[13] ZHU Zhe-qing, GENG Hai-jun, QIAN Yu-hua. Line-Segment Clustering Algorithm for Chemical Structure [J]. Computer Science, 2022, 49(5): 113-119.
[14] ZHANG Yu-jiao, HUANG Rui, ZHANG Fu-quan, SUI Dong, ZHANG Hu. Study on Affinity Propagation Clustering Algorithm Based on Bacterial Flora Optimization [J]. Computer Science, 2022, 49(5): 165-169.
[15] YAO Xiao-ming, DING Shi-chang, ZHAO Tao, HUANG Hong, LUO Jar-der, FU Xiao-ming. Big Data-driven Based Socioeconomic Status Analysis:A Survey [J]. Computer Science, 2022, 49(4): 80-87.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!