期刊文献+

基于加权频繁模式树的通信网络告警规则挖掘方法 被引量:13

Alarm Rule Mining Method in Telecommunication Network Based on Weighted Frequent Pattern-tree
下载PDF
导出
摘要 传统通信网络告警处理方法主要由维护专家依据经验判断形成处理规则并固化在网络告警系统中进行实现,然而该人工维护方式难以适应海量数据环境下实时通信告警规则的处理需求。为此,提出一种基于加权频繁模式树(WFP-tree)算法的告警规则自动挖掘方法,将原始告警数据按时间窗口方式进行分段处理,通过BP神经网络、支持向量机、层次分析法生成告警设备的权重信息,并采用WFP-tree算法自动挖掘加权频繁项集。实验结果表明,与传统Apriori和FP-growth算法相比,WFP-tree算法在通信网络告警分析方面具有更好的频繁项压缩效果及更强的重要关联规则发现能力。 Traditional communication network alarm correlation rules are often manually done by experts and coded into network fault management systems. However, the artificial maintenance method is difficult to meet the huge amounts of data processing requirements of real-time communication alarm rules. To solve this problem, this paper proposes an automatic alarm rule mining method based on Weighted Frequent Pattern-tree(WFP-tree) algorithm. It uses the sliding window method to convert raw data into alarm transactions, and employs BP neural network, Support Vector Machine (SVM) and Analytic Hierarchy Process (AHP) methods to generate the weight information of alarm equipment. Finally, it uses WFP-tree algorithm to automatically generate the weighted frequent itemset. The experimental results show that, the WFP-tree algorithm performs better in frequent itemset compression and important domain correlation rule finding compared with Apriori and FP-growth algorithms.
出处 《计算机工程》 CAS CSCD 北大核心 2016年第4期190-196,共7页 Computer Engineering
基金 上海市科技创新行动计划基金资助项目(13511505200) 上海市科技人才计划基金资助项目(14XD1421000) 上海财经大学2014年研究生创新基金资助项目(CXJJ-2014-438)
关键词 通信网络告警 关联规则 权重因子 加权频繁项集 FP-GROWTH算法 加权频繁模式树算法 支持度 communication network alarm correlation rule weighted factor weighted frequent itemset FP-growth algorithm Weighted Frequent Pattern-tree (WFP-tree) algorithm support degree
  • 相关文献

参考文献7

二级参考文献47

  • 1田志宏,方滨兴,张宏莉.基于半轮询驱动的网络入侵检测单元的设计与实现[J].通信学报,2004,25(7):146-152. 被引量:5
  • 2李辉,韩崇昭,郑庆华,昝鑫.一种基于交互式知识发现的入侵事件关联方法研究[J].计算机研究与发展,2004,41(11):1911-1918. 被引量:6
  • 3董晓梅,于戈,孙晶茹,王丽娜.基于频繁模式挖掘的报警关联与分析算法[J].电子学报,2005,33(8):1356-1359. 被引量:6
  • 4Mannila H Toivonen, Verkamo A I. Discovery of frequent episodes in event sequeneces[J]. Data Mining and Knowledge Discovery, 1997,(3):255-289.
  • 5Wellens C,Auerbach K. Towards useful network management[J]. Simple Times, 1996,4(3):3-5.
  • 6Aiko Pras. Network management architectures[D]. PH D Thesis,University of TWENTE, 1995.
  • 7Meira D M,Nogueira J M S.A Recursive Approach for Alarm Correlation in Telecommunication Networks[C]//Proc.of Network Operations and Management Symposium.2000.
  • 8Bouloutas A T,Calo S,Finkel A.Alarm Correlation and Fault Identification in Communication Networks[J].IEEE Transactions on Communications,1994,42(234):523-533.
  • 9Ekaette E U,Far B H.A Framework for Distributed Fault Management Using Intelligent Software Agents[C]//Proc.of IEEE Canadian Conference on Electrical and Computer Engineering.2003.
  • 10Steinder M,Sethi A S.End-to-End Service Failure Diagnosis Using Belief Networks[C]//Proc.of Network Operations and Management Symposium,Florence,Italy.2002.

共引文献54

同被引文献80

引证文献13

二级引证文献61

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部