{"title":"基于数据挖掘和LSTM的网络告警分析","authors":"Bin Lu","doi":"10.1145/3375998.3376023","DOIUrl":null,"url":null,"abstract":"Network alarms are becoming more and more complex, and the scale is increasing sharply. When the root alarm is generated by the devices, a lot of redundant alarms are often triggered. The traditional processing mode is difficult to find the root alarm and filter out the redundant alarm. We provide a new analysis method based on data mining and long short-term memory(LSTM) to find the root alarm and to filter out the redundant alarm.","PeriodicalId":395773,"journal":{"name":"Proceedings of the 2019 8th International Conference on Networks, Communication and Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Network Alarm Analysis Based on Data Mining and LSTM\",\"authors\":\"Bin Lu\",\"doi\":\"10.1145/3375998.3376023\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Network alarms are becoming more and more complex, and the scale is increasing sharply. When the root alarm is generated by the devices, a lot of redundant alarms are often triggered. The traditional processing mode is difficult to find the root alarm and filter out the redundant alarm. We provide a new analysis method based on data mining and long short-term memory(LSTM) to find the root alarm and to filter out the redundant alarm.\",\"PeriodicalId\":395773,\"journal\":{\"name\":\"Proceedings of the 2019 8th International Conference on Networks, Communication and Computing\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-12-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 2019 8th International Conference on Networks, Communication and Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3375998.3376023\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2019 8th International Conference on Networks, Communication and Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3375998.3376023","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Network Alarm Analysis Based on Data Mining and LSTM
Network alarms are becoming more and more complex, and the scale is increasing sharply. When the root alarm is generated by the devices, a lot of redundant alarms are often triggered. The traditional processing mode is difficult to find the root alarm and filter out the redundant alarm. We provide a new analysis method based on data mining and long short-term memory(LSTM) to find the root alarm and to filter out the redundant alarm.