Computer Science ›› 2018, Vol. 45 ›› Issue (11A): 287-291.

• Network & Communication • Previous Articles     Next Articles

Wireless Network Alarm Correlation Based on Time,Space and Rules

WAN Ying, HONG Mei, CHEN Yu-xing, WANG Shuai, FAN Zhe-ning   

  1. College of Computer Science,Sichuan University,Chengdu 610065,China
  • Online:2019-02-26 Published:2019-02-26

Abstract: The generation of a wireless network alarm is caused by multiple faults that occurs over a period of time in a complex wireless network.How to find the root alarm of the root fault quickly and accurately is an important issue for network managers.This paper presented a method of wireless network alarm association based on time,space and expert rules.The method is based on rules,network topology,and time series of alarm,and the method combines the space and time with the traditional single rules alarm association method to synthetically locate the root alarm.To solve the large-scale complex network structure,the method uses a hierarchical correlation method.First it finds the subnet which generates alarm,and then locates the alarm node from subnet.At the same time,to adapt the dynamic characteristics of wireless networks,the method maintenans network topology structure and expert rule base dynamically.Experimental results demonstrate that the accuracy rate of the proposed method is 86.6%.

Key words: Alarm correlation, Network topology, Root alarms, Rule base

CLC Number: 

  • TP311
[1]CHENG M X,WU W B.Data Analytics for Fault Localization in Complex Networks[J].IEEE Internet of Things Journal,2016,3(5):1.
[2]TORAB H,HOUMAIDI M E.Alarm data correlation utilizing method for use on e.g.Internet,involves applying set of rules to correlated alarm data to identify root cause for outage and to determine whether trouble ticket will be generated for outage:USA,2008181099[P].2008-07-31.
[3]LI J,WANG H,LIU Y.Research of Fault Alarm Correlation Analysis Based on Association Rules in Communication Network[C]∥International Conference on Applied Informatics and Communication.Berlin:Springer,2010:40-48.
[4]HOU S,ZHANG X.Analysis and Research for Network Management Alarms Correlation Based on Sequence Clustering Algorithm[C]∥International Conference on Intelligent Computation Technology and Automation. IEEE, 2008:982-986.
[5]WU P H,PENG W C,CHEN M S.Mining Sequential Alarm Patterns in a Telecommunication Database[M]∥Databases in Telecommunications II.Springer Berlin Heidelberg,2001:37-51.
[6]OUH J Z,WU P H,CHEN M S.Experimental Results on a Constrained Based Sequential Pattern Mining for Telecommunication Alarm Data[C]∥International Conference on Web Information Systems Engineering.IEEE,2001:186-193.
[7]AMARAL A A,ZARPELÃO B B,MENDES L D S,et al.Infe-rence of network anomaly propagation using spatio-temporal correlation[J].Journal of Network & Computer Applications,2012,35(6):1781-1792.
[8]AWAD M,HAMDOUN H.A framework for modelling mobile radio access networks for intelligent fault management[C]∥Basic Sciences and Engineering Studies.Sudan:IEEE,2016:43-49.
[9]陈瑜,陈国龙.Wu-Manber算法性能分析及其改进[J].计算机科学,2006,33(6):203-205.
[10]GUYET T,QUINIOU R.Extracting Temporal Patterns from Interval-Based Sequences[C]∥International Joint Conference on Artificial Intelligence.Barcelona,Catalonia,Spain:ACM,2011:1306-1311.
[11]LIU P,LI X M,FENG Y Q.An algorithm of multi-level fuzzy association rules mining with multiple minimum supports in network faults diagnosis[C]∥International Conference on Natural Computation.China:IEEE,2013:884-888.
[12]QUTEISHAT A,LIM C P.A modified fuzzy min-max neural network with rule extraction and its application to fault detection and classification[J].Applied Soft Computing,2008,8(2):985-995.
[13]QADER K,MO A.Fault Classification System for Computer Networks Using Fuzzy Probabilistic Neural Network Classifier[C]∥Communications in Computer and Information Science.Germany:Springer,2014:4789-4807.
[14]MOHAMED M,H A.A Fuzzy Neural Network Fault Diagnostic System[J].International Journal of Computer Applications,2014,94(94):9-13.
[15]SARAVANAN M,JYOTHI V L.A novel approach for sequential pattern mining by using genetic algorithm[C]∥Control,Instrumentation,Communication and Computational Technologies.India:IEEE,2014:284-288.
[16]TIKUNOV D,NISHIMURA T.Automated troubleshooting of mobile networks based on alarm and performance data using bayesian networks[C]∥International Conference on Software,Telecommunications and Computer Networks.Croatia:IEEE,2008:1-5.
[1] SUN Yi-fan, MI Zhi-chao, WANG Hai, ZHAO Ning. Cluster-based Topology Adaptive OLSR Protocol for UAV Swarm Network [J]. Computer Science, 2021, 48(6): 268-275.
[2] LIU Shan-shan, ZHU Hai-long, HAN Xiao-xia, MU Quan-qi, HE Wei. Enterprise Risk Assessment Model Based on Principal Component Regression and HierarchicalBelief Rule Base [J]. Computer Science, 2021, 48(11A): 570-575.
[3] LIU Jing, HUANG Ju, LAI Ying-xu, QIN Hua, ZENG Wei. Study on Secure Log Storage Method Based on Blockchain [J]. Computer Science, 2020, 47(11A): 388-395.
[4] LIU Xiao-dong, WEI Hai-ping, CAO Yu. Modeling and Stability Analysis for SIRS Model with Network Topology Changes [J]. Computer Science, 2019, 46(6A): 375-379.
[5] QU Guang-qiang, SUN Bin. Study on Trustworthy Backtracking Mechanism of Experimental Teaching Fund Based on Blockchain [J]. Computer Science, 2019, 46(11A): 553-556.
[6] QIN Ke-yun and LIN Hong. Relationships among Several Attribute Reduction Methods of Decision Formal Context [J]. Computer Science, 2018, 45(4): 257-259.
[7] ZHANG Guang-lan, YANG Qiu-hui, CHENG Xue-mei, JIANG Ke, WANG Shuai, TAN Wu-kun. Application of Sequence Pattern Mining in Communication Network Alarm Prediction [J]. Computer Science, 2018, 45(11A): 535-538.
[8] ZHOU Chang-jian, XING Jin-ge and LIU Hai-bo. Research on Network-layer Topology Discovery Algorithm Based on Multi-protocol [J]. Computer Science, 2017, 44(Z6): 361-365.
[9] XU Jing, LIU Yan-tao, XIA Gui-yang and Yasser MORGAN. Network Coding Based Topology Inference:A Survey [J]. Computer Science, 2016, 43(Z6): 242-248.
[10] WEI De-bin, QIN Yu-fan and YU Ran. Research on Satellite Network Topologies Survivability Evaluation Method [J]. Computer Science, 2016, 43(Z11): 301-303.
[11] WANG Han-jie, YANG Long-hao, FU Yang-geng, WU Ying-jie and GONG Xiao-ting. Differential Evolutionary Algorithm for Parameter Training of Belief Rule Base under Expert Intervention [J]. Computer Science, 2015, 42(5): 88-93.
[12] XU Qian and TAN Cheng-xiang. Mandatory Access Control Model for Android Based on Dynamic Privilege Set [J]. Computer Science, 2015, 42(11): 191-196.
[13] ZHENG Chun-feng and XU Yang. Localization Algorithm Based on Azimuth Angle and Network Topology [J]. Computer Science, 2014, 41(Z6): 273-275.
[14] YANG Xu,QIU Han,ZHU Jun-hu and WANG Qing-xian. Method for Probing Sources Selection Based on General Dispersity of Sources in Network Topology Discovery [J]. Computer Science, 2014, 41(Z6): 265-269.
[15] WU Wen,MENG Xiang-ru,KANG Qiao-yan and YANG Ting. Methods of Network Topology Evaluation and Optimization for Resilient Routing Layers Generation [J]. Computer Science, 2014, 41(1): 196-201.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!