Skip to main content
Log in

A Closed-Loop Automatic Data-Mining Approach for Preventive Network Monitoring

  • Published:
Journal of Network and Systems Management Aims and scope Submit manuscript

Abstract

As telecommunication networks grow in size and complexity, monitoring systems need to scale up accordingly. Alarm data generated in a large network are often highly correlated. These correlations can be explored to simplify the process of network fault management, by reducing the number of alarms presented to the network-monitoring operator. This makes it easier to react to network failures. But in some scenarios, it is highly desired to prevent the occurrence of these failures by predicting the occurrence of alarms before hand. This work investigates the usage of data mining methods to generate knowledge from historical alarm data, and using such knowledge to train a machine learning system, in order to predict the occurrence of the most relevant alarms in the network. The learning system was designed to be retrained periodically in order to keep an updated knowledge base.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20

Similar content being viewed by others

References

  1. Hätönen, K., Klemettinen, M., Mannila, H., Ronkainen, P., Toivonen, H.: Knowledge Discovery from Telecommunication Network Alarm Databases. In: ICDE, pp. 115–122 (1996)

  2. Cavafy, C.P.: But the wise perceive things about to happen. Princeton University Press, Collected Poems (1992)

    Google Scholar 

  3. Salfner, F., Lenk, M., Malek, M.: A survey of online failure prediction methods. ACM Comput. Surv. 42, 1–42 (2010)

    Article  Google Scholar 

  4. Dietterich, T.: Machine learning for sequential data: a review. In: Caelli, T., Amin, A., Duin, R.P.W., de Ridder, D., Kamel, M. (eds.) Structural, Syntactic, and Statistical Pattern Recognition. Springer, Heidelberg (2002)

  5. Vehviläinen, P., Hätönen, K., Kumpulainen, P.: Data mining in quality analysis of digital mobile telecommunications network. In: XVII IMEKO World Congress Metrology in the 3rd Millennium. Dubrovnik, Croatia (2003)

  6. Gangopadhyay, B., Arsénio, A., Antunes, C.: Comparative study of pattern mining techniques for network management system logs for convergent network. In: Data Engineering and Management. Springer Lecture Notes in Computer Science, vol. 6411, pp. 101–108 (2012)

  7. Weiss, G., Davison, B.: Data mining (2010). In: Bidgoli, H. (ed.) Handbook of Technology Management, pp. 542–555. John Wiley and Sons (2010)

  8. Fayyad, U., Piatetsky-Shapiro, G., Smyth, P.: From data mining to knowledge discovery in databases. AI Mag. 17(3), 37–54 (1996)

    Google Scholar 

  9. Vilalta, R. Ma, S. Predicting rare events in temporal domains. In: Data Mining, pp. 474–481 (2003)

  10. Hätönen, K., Klemettinen, M., Mannila, H., Ronkainen, P., Toivonen, H.: Rule Discovery in Alarm Databases. Report C-1996-7, Department of Computer Science, University of Helsinki (1996). http://www.cs.helsinki.fi/TR/C-1996/7

  11. Vilalta, R., Apte, C.V., Hellerstein, J.L., Ma, S., Weiss, S.M.: Predictive algorithms in the management of computer systems. IBM Syst. J. 41, 461–474 (2002)

    Article  Google Scholar 

  12. Sahoo, R.K., Oliner, A.J., Rish, I., Gupta, M., Moreira, J.E., Ma, S., Vilalta, R., Sivasubramaniam, A.: Critical event prediction for proactive management in large-scale computer clusters. In: Knowledge Discovery in Databases (KDD), Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, ACM, New York, NY, USA, pp. 426–435 (2003)

  13. Weiss, G.: Timeweaver: a genetic algorithm for identifying predictive patterns in sequences of events. In: Proceedings of the Genetic and Evolutionary Computation Conference. Morgan Kaufmann (1999)

  14. Mohamed, A., Ahmed, M., Chau, S.: A new adaptive evidential reasoning approach for network alarm correlation. In: 2012 IEEE 10th International Symposium on Applied Machine Intelligence and Informatics (SAMI), pp. 241–246 (2012)

  15. Sridevi, S., Rajaram, S., Swadhikar, C.: An intelligent prediction system for time series data using periodic pattern mining in temporal databases. In: Proceedings of the First International Conference on Intelligent Interactive Technologies and Multimedia. IITM’10, ACM, New York, NY, USA, pp. 163–171 (2010)

  16. Abdullah, Z., Deris, M.: Association rules mining with relative weighted support. In: Proceedings of the 11th International Conference on Information Integration and Web-based Applications and Services, iiWAS’09, ACM, New York, NY, USA, pp. 507–511 (2009)

  17. Graf, S., Prinz, A.: Time in state machines. In: Proceedings of the 12th International Workshop on Abstract State Machines, Abstract State Machines (ASM), Paris, France, 8–11 March 2005, pp. 217–232 (2005). http://www.univ-paris12.fr/lacl/dima/asm05/GrafPrinzASM2005-pgnb.pdf

  18. Hitike, K. Khalifa, O.: Comparison of supervised and unsupervised learning classifiers for human posture recognition. In: Computer and Communication Engineering (ICCCE), pp. 1–6 (2010)

  19. Yao, X.: Evolving artificial neural networks. Proc. IEEE 87, 1423–1447 (1999)

    Article  Google Scholar 

  20. Rabiner, L.: A tutorial on hidden Markov models and selected applications in speech recognition. Proc. IEEE 77, 257–286 (1989)

    Article  Google Scholar 

  21. Ariu, D., Giacinto, G., Perdisci, R.: Sensing attacks in computers networks with hidden markov models. In: Machine Learning and Data Mining in Pattern Recognition. Springer Lecture Notes in Computer Science, vol. 4571, pp. 449–463 (2007)

  22. Teixeira, D., Arsénio, A.: Intelligent network client profiler. J. Adv. Comput. Netw. 1(2), 125–131 (2013)

    Article  Google Scholar 

  23. Agrawal, R., Srikant, R.: Mining sequential patterns. In: Proceedings of the Eleventh International Conference on Data Engineering, pp. 3–14 (1995)

  24. Sumithra, R. Paul, S. Using distributed apriori association rule and classical apriori mining algorithms for grid based knowledge discovery. In: 2010 International Conference on Computing Communication and Networking Technologies (ICCCNT), pp. 1–5 (2010)

  25. Domingos, P.: Markov logic: a unifying language for knowledge and information management. In: Proceedings of the 17th ACM conference on Information and knowledge management, CIKM’08, ACM, New York, NY, USA, pp. 519–519 (2008)

  26. Popescul, A., Ungar, L., Lawrence, S., Pennock, D.: Statistical relational learning for document mining. In: Third IEEE International Conference on Data Mining. ICDM 2003, pp. 275–282 (2003)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Artur Arsenio.

Additional information

This work was carried out while Ivan Caravela and Nuno Borges were at Nokia Siemens Networks.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Caravela, I., Arsenio, A. & Borges, N. A Closed-Loop Automatic Data-Mining Approach for Preventive Network Monitoring. J Netw Syst Manage 24, 974–1003 (2016). https://doi.org/10.1007/s10922-015-9356-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10922-015-9356-6

Keywords

Navigation