Papers
Topics
Authors
Recent
Search
2000 character limit reached

A Hybrid Approach for Smart Alert Generation

Published 2 Jun 2023 in cs.NI and cs.AI | (2306.07983v1)

Abstract: Anomaly detection is an important task in network management. However, deploying intelligent alert systems in real-world large-scale networking systems is challenging when we take into account (i) scalability, (ii) data heterogeneity, and (iii) generalizability and maintainability. In this paper, we propose a hybrid model for an alert system that combines statistical models with a whitelist mechanism to tackle these challenges and reduce false positive alerts. The statistical models take advantage of a large database to detect anomalies in time-series data, while the whitelist filters out persistently alerted nodes to further reduce false positives. Our model is validated using qualitative data from customer support cases. Future work includes more feature engineering and input data, as well as including human feedback in the model development process.

Authors (3)
Definition Search Book Streamline Icon: https://streamlinehq.com
References (17)
  1. M. Lad, D. Massey, D. Pei, Y. Wu, B. Zhang, and L. Zhang, “Phas: A prefix hijack alert system.” in USENIX Security symposium, vol. 1, no. 2, 2006, p. 3.
  2. N. Laptev, S. Amizadeh, and I. Flint, “Generic and scalable framework for automated time-series anomaly detection,” in Proceedings of the 21th ACM SIGKDD international conference on knowledge discovery and data mining, 2015, pp. 1939–1947.
  3. O. Vallis, J. Hochenbaum, and A. Kejariwal, “A novel technique for long-term anomaly detection in the cloud,” in 6th {normal-{\{{USENIX}normal-}\}} workshop on hot topics in cloud computing (HotCloud 14), 2014.
  4. H. Ren, B. Xu, Y. Wang, C. Yi, C. Huang, X. Kou, T. Xing, M. Yang, J. Tong, and Q. Zhang, “Time-series anomaly detection service at microsoft,” in Proceedings of the 25th ACM SIGKDD international conference on knowledge discovery & data mining, 2019, pp. 3009–3017.
  5. B. Hussain, Q. Du, A. Imran, and M. A. Imran, “Artificial intelligence-powered mobile edge computing-based anomaly detection in cellular networks,” IEEE Transactions on Industrial Informatics, vol. 16, no. 8, pp. 4986–4996, 2019.
  6. B. Hussain, Q. Du, S. Zhang, A. Imran, and M. A. Imran, “Mobile edge computing-based data-driven deep learning framework for anomaly detection,” IEEE Access, vol. 7, pp. 137 656–137 667, 2019.
  7. C. Yin, S. Zhang, J. Wang, and N. N. Xiong, “Anomaly detection based on convolutional recurrent autoencoder for iot time series,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 52, no. 1, pp. 112–122, 2022.
  8. Z. Yao, Y. Desmouceaux, J.-A. Cordero-Fuertes, M. Townsley, and T. Clausen, “Efficient data-driven network functions,” in 2022 30th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS).   IEEE, 2022, pp. 152–159.
  9. D. Liu, Y. Zhao, H. Xu, Y. Sun, D. Pei, J. Luo, X. Jing, and M. Feng, “Opprentice: Towards practical and automatic anomaly detection through machine learning,” in Proceedings of the 2015 Internet Measurement Conference, ser. IMC ’15.   New York, NY, USA: Association for Computing Machinery, 2015, p. 211–224. [Online]. Available: https://doi.org/10.1145/2815675.2815679
  10. H. Xu, W. Chen, N. Zhao, Z. Li, J. Bu, Z. Li, Y. Liu, Y. Zhao, D. Pei, Y. Feng, J. Chen, Z. Wang, and H. Qiao, “Unsupervised anomaly detection via variational auto-encoder for seasonal kpis in web applications,” in Proceedings of the 2018 World Wide Web Conference, ser. WWW ’18.   Republic and Canton of Geneva, CHE: International World Wide Web Conferences Steering Committee, 2018, p. 187–196. [Online]. Available: https://doi.org/10.1145/3178876.3185996
  11. LinkedIn, “Luminol,” https://github.com/linkedin/luminol, 2021.
  12. B. Rosner, “Percentage points for a generalized esd many-outlier procedure,” Technometrics, vol. 25, no. 2, pp. 165–172, 1983.
  13. A. Antoniadis, “Wavelets in statistics: A review,” Statistical Methods and Applications, vol. 6, pp. 97–130, 08 1997.
  14. A. Mahimkar, Z. Ge, J. Wang, J. Yates, Y. Zhang, J. Emmons, B. Huntley, and M. Stockert, “Rapid detection of maintenance induced changes in service performance,” in Proceedings of the Seventh COnference on Emerging Networking EXperiments and Technologies, ser. CoNEXT ’11.   New York, NY, USA: Association for Computing Machinery, 2011. [Online]. Available: https://doi.org/10.1145/2079296.2079309
  15. Y. Zhang, Z. Ge, A. Greenberg, and M. Roughan, “Network anomography,” in Proceedings of the 5th ACM SIGCOMM Conference on Internet Measurement, ser. IMC ’05.   USA: USENIX Association, 2005, p. 30.
  16. F. Rasheed, P. Peng, R. Alhajj, and J. Rokne, “Fourier transform based spatial outlier mining,” in Proceedings of the 10th International Conference on Intelligent Data Engineering and Automated Learning, ser. IDEAL’09.   Berlin, Heidelberg: Springer-Verlag, 2009, p. 317–324.
  17. V. Krishnan, A. Makdah, A. AlRahman, and F. Pasqualetti, “Lipschitz bounds and provably robust training by laplacian smoothing,” Advances in Neural Information Processing Systems, vol. 33, pp. 10 924–10 935, 2020.
Citations (1)

Summary

No one has generated a summary of this paper yet.

Paper to Video (Beta)

No one has generated a video about this paper yet.

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Continue Learning

We haven't generated follow-up questions for this paper yet.

Collections

Sign up for free to add this paper to one or more collections.