Communication Network Alarm Correlation Based on the Confidence Fusion Algorithm

Article Preview

Abstract:

In this article we achieve SDH communication network correlation analysis by the confidence fusion algorithm. We take the effect of the alarm topology relationship on the alarm timing relationship into the calculation process of confidence fusion algorithm .Thus it can get alarm correlation results more in line with objective facts. According to the correlation calculation results it forms the alarm correlation transactions, then applying the alarm correlation transactions to the alarm association rules mining. We compare the mining results with the traditional method based on sliding window. The experimental results show that the mining results are more effective after introducing the confidence fusion algorithm.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 989-994)

Pages:

2237-2240

Citation:

Online since:

July 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] J.W. Han. Mining frequent patterns without candidate generation [A] . In: Proceedings of the 2000 ACMSIGMOD conference on Management of Data[C], Dallas, TX, 2000 : 1-12.

Google Scholar

[2] H. Mannila, H. Toivonen, A. I Verkamo. Discovery of Frequent Episodes in Event Sequences[J]. Data Mining and Knowledge Discovery 1, 1997: 259–289.

DOI: 10.1023/a:1009748302351

Google Scholar

[3] Z.T. Li, A.F. Zhang, J. Lei. Real-Time Correlation of Network Security Alerts[C]. IEEE International Conference on Digital Object Identifier, 2007: 73-80.

Google Scholar

[4] S. Lagaian., F. Amiri, A. Enayati. Frequent Item set mining-based Alert Correlation for Extracting multi-stage Attack Scenarios[C]. 2012 Sixth International Symposium on Digital Object Identifier, 2012: 1010-1014.

DOI: 10.1109/istel.2012.6483134

Google Scholar

[5] Z.H. Tian, Y.Z. Zhang, W.Z. Zhang,etal. An adaptive alert correlation method based on pattern mining and clustering analysis[J]. Journal of Computer Research and Development, 2009 ; 46(8) : 1304-1315.

Google Scholar

[6] J. Wu, X.M. Li Efficient distributed mining algorithm for alarm correlation in communication networks[J]. Computer Science, 2009; 36(11): 204-207, 212.

Google Scholar

[7] Q.F. Xu, B. Xiao, J. Guo. An approach on association patterns mining in telecommunication alarm database[J]. Journal of Beijing University of Posts and Telecommunications, 2011; 34(2): 86-89.

Google Scholar

[8] H.D. Wang, X.Q. Zheng, H.J. Zhang. Web knowledge fusion system based on certainty factor theory and its application[J]. Computer Systems & Applications, 2011; 20(1): 1-6.

Google Scholar

[9] R. Agrawal. Mining association rules between sets of items in large databases [C] . Proceedings of the 1993 ACM SIG MOD Conference . Washington , D C : [ s. n. ] , 1993 : 207-216.

DOI: 10.1145/170036.170072

Google Scholar