Advertisement

A Resource Allocating Neural Network Based Approach for Detecting End-to-End Network Performance Anomaly

  • Wenwei Li
  • Dafang Zhang
  • Jinmin Yang
  • Gaogang Xie
  • Lei Wang
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3973)

Abstract

Automatic detection of end-to-end network performance anomalies is important to efficient network management and optimization. We present an end-to-end network performance anomalies detection method, based on characterizing of the dynamic statistical properties of RTT normality. The experiment on real Internet end-to-end path RTT data shows that, the proposed method is accurate in detecting performance anomalies, it can successfully detect about 96.25% anomalies in the experiment.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Li, B.C., Yin, H.J.: Face Recognition Using RBF Neural Networks and Wavelet Transform. In: Wang, J., Liao, X.-F., Yi, Z. (eds.) ISNN 2005. LNCS, vol. 3497, pp. 105–111. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  2. 2.
    Ho, L., Cavuto, D., Papavassiliou, S.: Adaptive/Automated Detection of Service Anomalies in Transaction WANs: Network Analysis, Algorithms, Implementation, and Deployment. IEEE Journal on Selected Areas in Communications 18(5), 744–757 (2000)CrossRefGoogle Scholar
  3. 3.
    Pu, X.R., Yi, Z., Zheng, Z.M., Zhou, W., Ye, M.: Face Recognition Using Fisher Non-negative Matrix Factorization with Sparseness Constraints. In: Wang, J., Liao, X.-F., Yi, Z. (eds.) ISNN 2005. LNCS, vol. 3497, pp. 112–117. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  4. 4.
    Sun, C.Y., Feng, C.B.: Neural Networks for Nonconvex Nonlinear Programming Problems: A Switching Control Approach. In: Wang, J., Liao, X.-F., Yi, Z. (eds.) ISNN 2005. LNCS, vol. 3496, pp. 694–699. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  5. 5.
    Platt, J.: A Resource-Allocating Network for Function Interpolation. Neural Computation 3(2), 213–225 (1991)CrossRefMathSciNetGoogle Scholar
  6. 6.
    Hao, Z.F., Liu, B., Yang, X.W., Liang, Y.C., Zhao, F.: Twi-Map Support Vector Machine for Multi-classification Problems. In: Wang, J., Liao, X.-F., Yi, Z. (eds.) ISNN 2005. LNCS, vol. 3496, pp. 869–874. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  7. 7.
    Guo, C.G., Anthony, K.: An Optimal Neural-Network Model for Learning Posterior Probability Functions from Observations. In: Yin, F.-L., Wang, J., Guo, C. (eds.) ISNN 2004. LNCS, vol. 3173, pp. 370–376. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  8. 8.
    Lu, W., Lu, H.T., Chung, F.L.: Subsampling-Based Robust Watermarking Using Neural Network Detector. In: Wang, J., Liao, X.-F., Yi, Z. (eds.) ISNN 2005. LNCS, vol. 3497, pp. 801–806. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  9. 9.
    Manikopoulos, C., Papavassiliou, S.: Network Intrusion and Fault Detection: A Statistical Anomaly Approach. IEEE Communications Magazine 40(10), 76–82 (2002)CrossRefGoogle Scholar
  10. 10.
    Han, M., Fan, M.M., Xi, J.H.: Study of Nonlinear Multivariate Time Series Prediction Based on Neural Networks. In: Wang, J., Liao, X.-F., Yi, Z. (eds.) ISNN 2005. LNCS, vol. 3497, pp. 618–623. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  11. 11.
    Yang, Y.Q., Cao, J.D., Zhu, D.Q.: A Study of Portfolio Investment Decision Method Based on Neural Network. In: Yin, F.-L., Wang, J., Guo, C. (eds.) ISNN 2004. LNCS, vol. 3174, pp. 976–981. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  12. 12.
    McGregor, A., Braun, H.-W.: The NLANR Network Analysis Infrastructure. IEEE Communications Magazine 38(5), 122–128 (2000)CrossRefGoogle Scholar
  13. 13.
    Sun, F.C., Zhang, H.: Neuro-Fuzzy Hybrid Position/Force Control for a Space Robot with Flexible Dual-Arms. In: Yin, F.-L., Wang, J., Guo, C. (eds.) ISNN 2004. LNCS, vol. 3174, pp. 13–18. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  14. 14.
    Liu, J., Yuan, D.F., Ci, S., Zhong, Y.J.: A New QoS Routing Optimal Algorithm in Mobile Ad Hoc Networks Based on Hopfield Neural Network. In: Wang, J., Liao, X.-F., Yi, Z. (eds.) ISNN 2005. LNCS, vol. 3498, pp. 343–348. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  15. 15.
    Li, G., Patrick, W.: An Analysis of Network Performance Degradation Induced by Workload Fluctuations. IEEE/ACM Transaction on Network 3(4), 433–440 (1995)CrossRefGoogle Scholar
  16. 16.
    Wen, Y.M., Lu, B.L.: A Hierarchical and Parallel Method for Training Support Vector Machines. In: Wang, J., Liao, X.-F., Yi, Z. (eds.) ISNN 2005. LNCS, vol. 3496, pp. 881–886. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  17. 17.
    Li, S.W., Li, S.R.: Hopf Bifurcation in a Single Inertial Neuron Model with a Discrete Delay. In: Wang, J., Liao, X.-F., Yi, Z. (eds.) ISNN 2005. LNCS, vol. 3496, pp. 327–332. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  18. 18.
    Hajji, H., Far, B.H.: Continuous Network Monitoring for Fast Detection of Performance Problems. In: Proceedings of International Symposium on Performance Evaluation of Computer and Telecommunication Systems (2001)Google Scholar
  19. 19.
    Zhang, J., Liao, X.F., Li, C.D., Lu, A.W.: A Further Result for Exponential Stability of Neural Networks with Time-Varying Delays. In: Wang, J., Liao, X.-F., Yi, Z. (eds.) ISNN 2005. LNCS, vol. 3496, pp. 120–125. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  20. 20.
    Jiang, M.H., Shen, Y., Liu, M.Q.: Global Exponential Stability of Non-autonomous Neural Networks with Variable Delay. In: Wang, J., Liao, X.-F., Yi, Z. (eds.) ISNN 2005. LNCS, vol. 3496, pp. 108–113. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  21. 21.
    Juan, M., Garcia-Teodoro, P.: Anomaly Detection Methods in Wired Networks: A Survey and Taxonomy. Computer Communications 27(3), 1569–1584 (2004)Google Scholar
  22. 22.
    Zeng, Z.G., Chen, B.S., Wang, Z.F.: Globally Attractive Periodic State of Discrete-Time Cellular Neural Networks with Time-Varying Delays. In: Wang, J., Liao, X.-F., Yi, Z. (eds.) ISNN 2005. LNCS, vol. 3496, pp. 282–287. Springer, Heidelberg (2005)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Wenwei Li
    • 1
  • Dafang Zhang
    • 2
  • Jinmin Yang
    • 2
  • Gaogang Xie
    • 3
  • Lei Wang
    • 2
  1. 1.College of Computer and CommunicationHunan UniversityChangshaChina
  2. 2.School of SoftwareHunan UniversityChangshaChina
  3. 3.Institute of Computing TechnologyChinese Academy of ScienceBeijingChina

Personalised recommendations