3,106 research outputs found

    Discovering unbounded episodes in sequential data

    Get PDF
    One basic goal in the analysis of time-series data is to find frequent interesting episodes, i.e, collections of events occurring frequently together in the input sequence. Most widely-known work decide the interestingness of an episode from a fixed user-specified window width or interval, that bounds the subsequent sequential association rules. We present in this paper, a more intuitive definition that allows, in turn, interesting episodes to grow during the mining without any user-specified help. A convenient algorithm to efficiently discover the proposed unbounded episodes is also implemented. Experimental results confirm that our approach results useful and advantageous.Postprint (published version

    Data mining based cyber-attack detection

    Get PDF

    Fault management preventive maintenance approach in mobile networks using sequential pattern mining

    Get PDF
    Mobile networks' fault management can take advantage of Machine Learning (ML) algorithms making its maintenance more proactive and preventive. Currently, Network Operations Centers (NOCs) still operate in reactive mode, where the troubleshoot is only performed after the problem identification. The network evolution to a preventive maintenance enables the problem prevention or quick resolution, leading to a greater network and services availability, a better operational efficiency and, above all, ensures customer satisfaction. In this paper, different algorithms for Sequential Pattern Mining (SPM) and Association Rule Learning (ARL) are explored, to identify alarm patterns in a live Long Term Evolution (LTE) network, using Fault Management (FM) data. A comparative performance analysis between all the algorithms was carried out, having observed, in the best case scenario, a decrease of 3.31% in the total number of alarms and 70.45% in the number of alarms of a certain type. There was also a considerable reduction in the number of alarms per network node in a considered area, having identified 39 nodes that no longer had any unresolved alarm. These results demonstrate that the recognition of sequential alarm patterns allows taking the first steps in the direction of preventive maintenance in mobile networks.info:eu-repo/semantics/publishedVersio

    An intelligent alarm management system for large-scale telecommunication companies

    Get PDF
    This paper introduces an intelligent system that performs alarm correlation and root cause analysis. The system is designed to operate in large- scale heterogeneous networks from telecommunications operators. The pro- posed architecture includes a rules management module that is based in data mining (to generate the rules) and reinforcement learning (to improve rule se- lection) algorithms. In this work, we focus on the design and development of the rule generation part and test it using a large real-world dataset containing alarms from a Portuguese telecommunications company. The correlation engine achieved promising results, measured by a compression rate of 70% and as- sessed in real-time by experienced network administrator staff

    Intrusion Detection and Anomaly Detection System Using Sequential Pattern Mining

    Full text link
    Nowadays the security methods from password protected access up to firewalls which are used to secure the data as well as the networks from attackers. Several times these type of security methods are not enough to protect data. We can consider the use of Intrusion Detection Systems (IDS) is the one way to secure the data on critical systems. Most of the research work is going on the effectiveness and exactness of the intrusion detection, but these attempts are for the detection of the intrusions at the operating system and network level only. It is unable to detect the unexpected behavior of systems due to Malicious transactions in databases. The method used for spotting any interferes on the information in the form of database known as database intrusion detection. It relies on enlisting the execution of a transaction. After that, if the recognized pattern is aside from those regular patterns actual is considered as an intrusion. But the identified problem with this process is that the accuracy algorithm which is used may not identify entire patterns. This type of challenges can affect in two ways. 1) Missing of the database with regular patterns. 2) The detection process neglects some new patterns. Therefore we proposed sequential data mining method by using new Modified Apriori Algorithm. The algorithm upturns the accurateness and rate of pattern detection by the process. The Apriori algorithm with modifications is used in the proposed model

    A framework for modelling mobile radio access networks for intelligent fault management

    Get PDF
    Postprin
    • …
    corecore