Wu et al., 2001 - Google Patents
Mining sequential alarm patterns in a telecommunication databaseWu et al., 2001
- Document ID
- 5125800210852146892
- Author
- Wu P
- Peng W
- Chen M
- Publication year
- Publication venue
- International workshop on databases in telecommunications
External Links
Snippet
A telecommunication system produces daily a large amount of alarm data which contains hidden valuable information about the system behavior. The knowledge discovered from alarm data can be used in finding problems in networks and possibly in predicting severe …
- 238000005065 mining 0 title abstract description 48
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/06—Arrangements for maintenance or administration or management of packet switching networks involving management of faults or events or alarms
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing packet switching networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/26—Monitoring arrangements; Testing arrangements
- H04L12/2602—Monitoring arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8824648B2 (en) | Network assurance analytic system | |
US7526322B2 (en) | Real-time analyst program for processing log files from network elements | |
Wu et al. | Mining sequential alarm patterns in a telecommunication database | |
US6792269B2 (en) | System, method and apparatus for tracking deployment of cellular telephone network sites | |
US6604208B1 (en) | Incremental alarm correlation method and apparatus | |
JP3510658B2 (en) | Network analysis method | |
US8332502B1 (en) | Business to business network management event detection and response system and method | |
US6788933B2 (en) | System, method and apparatus for capturing and processing call processing failures occurring at a digital wireless switch | |
US9247057B2 (en) | System and method for providing proactive service assurance in emergency networks | |
CN102457893A (en) | Data processing method and equipment | |
Lozonavu et al. | Relation discovery of mobile network alarms with sequential pattern mining | |
US11431739B1 (en) | Multi-stage network scanning | |
US20080222059A1 (en) | Computer-implemented method, computer program and system for analyzing data records | |
US7653742B1 (en) | Defining and detecting network application business activities | |
Ouh et al. | Experimental results on a constraint based sequential pattern mining for telecommunication alarm data | |
Sun et al. | Finding event-oriented patterns in long temporal sequences | |
CN101350733A (en) | System for acquiring net element performance data base on preposition data server and implementing method thereof | |
JPH08314763A (en) | Log information analysis device | |
Sozuer et al. | A new approach for clustering alarm sequences in mobile operators | |
US20090030904A1 (en) | Method for the Approximate Matching of Regular Expressions, in Particular for Generating Intervention Workflows in a Telecommunication Network | |
Sun et al. | Introducing uncertainty into pattern discovery in temporal event sequences | |
Ileri et al. | Alarm sequence rule mining extended with a time confidence parameter | |
US20070113134A1 (en) | Test data reporting and analyzing using data array and related data analysis | |
CN112887925A (en) | Short message pushing method, edge server node and service server node | |
Lin et al. | Research on extracting risk control rules for Internet of Things business |