Skip to main content

A Method of Rule Induction for Predicting and Describing Future Alarms in a Telecommunication Network

  • Conference paper
  • First Online:

Abstract

In order to gain insights into events and issues that may cause alarms in parts of IP networks, intelligent methods that capture and express causal relationships are needed. Methods that are predictive and descriptive are rare and those that do predict are often limited to using a single feature from a vast data set. This paper follows the progression of a Rule Induction Algorithm that produces rules with strong causal links that are both descriptive and predict events ahead of time. The algorithm is based on an information theoretic approach to extract rules comprising of a conjunction of network events that are significant prior to network alarms. An empirical evaluation of the algorithm is provided.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. CPNI/Centre for the Protection of National Infrastructure. Telecommunications Resilience Good Practice Guide Version 4. Technical Report March, Centre for the Protection of National Infrastructure (2006)

    Google Scholar 

  2. Perrochon, L., Mann, W., Kasriel, S., Luckham, D.C.: Event mining with event processing networks. In: Methodologies for Knowledge Discovery and Data Mining. Third Pacific-Asia Conference, PAKDD-99 Beijing, China, April 2628, 1999 Proceedings, pp. 474–478 (1999)

    Google Scholar 

  3. Fülöp, L.J., Tóth, G., Rácz, R., Pánczél, J., Gergely, T., Beszédes, Á., Farkas, L.: Survey on complex event processing and predictive analytics. In: Proceedings of the Fifth Balkan Conference in Informatics, pp. 26–31 (2010)

    Google Scholar 

  4. Klemettinen, M., Heikki, M., Toivonen, H.: Rule discovery in telecommunication alarm data. J. Netw. Syst. Manage. 7(4) (1999)

    Google Scholar 

  5. Weiss, G.M.: Data mining in the telecommunications industry. In: Data Mining and Knowledge Discovery Handbook, pp. 1189–1201 (2005)

    Google Scholar 

  6. Khan, I., Huang, J.Z., Tung, N.T.: Learning time-based rules for prediction of alarms from telecom alarm data using ant colony optimization. Int. J. Comput. Inf. Technol. ISSN: 2279 0764

    Google Scholar 

  7. Karimi, K., Hamilton, H.J.: TimeSleuth: a tool for discovering causal and temporal rules. In: 14th IEEE International Conference on Tools with Artificial Intelligence, 2002. (ICTAI 2002). Proceedings, pp. 375–380 (2002)

    Google Scholar 

  8. Devitt, A., Duffin, J., Moloney, R.: Topographical proximity for mining network alarm data. In: Proceeding of the 2005 ACM SIGCOMM Workshop on Mining Network Data—MineNet’05, p. 179 (2005)

    Google Scholar 

  9. Weiss, G., Hirsh, H.: Learning to predict rare events in event sequences. In: Kdd-98, pp. 359–363 (1998)

    Google Scholar 

  10. Agrawal, R., Srikant, R.: Fast algorithms for mining association rules. In: Proceedings of 20th International Conference on VLDB, pp. 487–499 (1994)

    Google Scholar 

  11. Jaudet, M., Iqbal, N.: Neural networks for fault-prediction in a telecommunications network. In: 8th International Multitopic Conference, 2004. Proceedings of INMIC 2004, pp. 315–320 (2004)

    Google Scholar 

  12. Fürnkranz, J., Gamberger, D., Lavrač, N.: Foundations of Rule Learning. Cognitive Technologies. Springer, Berlin (2012)

    Book  MATH  Google Scholar 

  13. Fürnkranz, J.: A pathology of bottom-up hill-climbing in inductive rule learning. In: Algorithmic Learning Theory, vol. 2533(Section 2), pp. 263–277 (2002)

    Google Scholar 

  14. Leech, W.J.: A rule-based process control method with feedback. ISA Trans. 26, 73–78 (1986)

    Google Scholar 

  15. Quinlan, J.R.: C4.5: Programs for Machine Learning. Morgan Kaufmann, San Francisco (1993)

    Google Scholar 

  16. Cendrowska, J.: PRISM: an algorithm for inducing modular rules. Int. J. Man-Mach. Stud. 27, 349–370 (1987)

    Article  MATH  Google Scholar 

  17. Chaudhry, N.: Introduction to stream data management. In: Chaudhry, N., Shaw, K., Abdelguerfi, M. (eds.) Stream Data Management. Database, pp. 1–11. Springer, US (2006)

    Google Scholar 

  18. Michalski, R.S.: On the quasi-minimal solution of the general covering problem (1969)

    Google Scholar 

  19. Taylor, B.J., Darrah, M.A.: Rule extraction as a formal method for the verification and validation of neural networks. In: Proceedings of the International Joint Conference on Neural Networks, vol. 5, pp. 2915–2920 (2005)

    Google Scholar 

  20. Gopalakrishnan, V., Lustgarten, J.L., Visweswaran, S., Cooper, G.F.: Bayesian rule learning for biomedical data mining. Bioinformatics 26(5), 668–675 (2010)

    Article  Google Scholar 

  21. Gusfield, D.: Algorithms on Strings, Trees and Sequences: Computer Science and Computational Biology (1997)

    Google Scholar 

  22. Yi, B.-K., Jagadish, H.V., Faloutsos, C.: Efficient retrieval of similar time sequences under time warping. In: 14th International Conference on Data Engineering, 1998. Proceedings, pp. 201–208. IEE (1998)

    Google Scholar 

  23. Map Data @ 2016 Geo-Basis-DE/BKG and Google. Google Maps (2016)

    Google Scholar 

  24. Cao, F., Ester, M., Qian, W., Zhou, A.: Density-based clustering over an evolving data stream with noise. In: SDM, vol. 6, pp. 328–339 (2006)

    Google Scholar 

  25. Wrench, C., Stahl, F., Di Fatta, G., Karthikeyan, V., Nauck, D.: Towards expressive rule induction on IP network event streams. In: Research and Development in Intelligent Systems XXXII: Incorporating Applications and Innovations in Intelligent Systems XXIII, pp. 191–196. Springer, Cham (2015)

    Google Scholar 

  26. Smyth, P., Goodman, R.M.: An Information Theoretic Approach to Rule Induction from Databases (1992)

    Google Scholar 

  27. Menc, E.L., Janssen, F.: Towards Multilabel Rule Learning (2008)

    Google Scholar 

  28. Zhang, M., Zhou, Z.: A review on multi-label learning algorithms 26(8), 1819–1837 (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chris Wrench .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Wrench, C., Stahl, F., Le, T., Di Fatta, G., Karthikeyan, V., Nauck, D. (2016). A Method of Rule Induction for Predicting and Describing Future Alarms in a Telecommunication Network. In: Bramer, M., Petridis, M. (eds) Research and Development in Intelligent Systems XXXIII. SGAI 2016. Springer, Cham. https://doi.org/10.1007/978-3-319-47175-4_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-47175-4_23

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-47174-7

  • Online ISBN: 978-3-319-47175-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics