首页 | 本学科首页   官方微博 | 高级检索  
     

序列模式挖掘在网络告警分析中的应用
引用本文:端义锋,胡谷雨,丁力.序列模式挖掘在网络告警分析中的应用[J].北京邮电大学学报,2004,27(Z2):157-161.
作者姓名:端义锋  胡谷雨  丁力
作者单位:解放军理工大学,指挥自动化学院,南京,210007
摘    要:序列模式挖掘可以用来有效地发现网络系统中的告警关联知识.论文研究了序列模式挖掘在网络告警分析中的具体应用.首先,将挖掘过程分成了特定设备告警序列挖掘、同类设备告警序列挖掘和互联设备告警序列挖掘等3类,根据不同的用户意图来有效地确定挖掘范围,避免对无关数据的访问.为了进一步提高挖掘算法的执行效率,又提出了用于描述网络拓扑信息的拓扑约束,并设计了基于拓扑约束的互联设备告警序列模式挖掘算法.

关 键 词:网络管理  告警序列模式挖掘  拓扑约束
文章编号:1007-5321(2004)增-0157-05
修稿时间:2004年7月20日

An Application of Sequential Pattern Mining in Network Alarm Data Analyses
DUAN Yi-feng,HU Gu-yu,DING Li.An Application of Sequential Pattern Mining in Network Alarm Data Analyses[J].Journal of Beijing University of Posts and Telecommunications,2004,27(Z2):157-161.
Authors:DUAN Yi-feng  HU Gu-yu  DING Li
Abstract:Sequential pattern mining provides an effective way to find the knowledge of network alarms. Applications of alarm sequential pattern mining are studied in this paper. Firstly, the mining procedures are categorized into three kinds such as alarm sequential pattern mining of special device, device type and connected devices to focus on the alarm data based on users' intentions. Further, a mining constraint called topological constraint is proposed, which extends a new way to describe the network topological information. And an algorithm for alarm sequential pattern mining of connected devices is designed based on topological constraints.
Keywords:network management  alarm sequential pattern mining  topological constraints  
本文献已被 CNKI 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号