A Hybrid Approach for Smart Alert Generation
Abstract: Anomaly detection is an important task in network management. However, deploying intelligent alert systems in real-world large-scale networking systems is challenging when we take into account (i) scalability, (ii) data heterogeneity, and (iii) generalizability and maintainability. In this paper, we propose a hybrid model for an alert system that combines statistical models with a whitelist mechanism to tackle these challenges and reduce false positive alerts. The statistical models take advantage of a large database to detect anomalies in time-series data, while the whitelist filters out persistently alerted nodes to further reduce false positives. Our model is validated using qualitative data from customer support cases. Future work includes more feature engineering and input data, as well as including human feedback in the model development process.
- M. Lad, D. Massey, D. Pei, Y. Wu, B. Zhang, and L. Zhang, “Phas: A prefix hijack alert system.” in USENIX Security symposium, vol. 1, no. 2, 2006, p. 3.
- N. Laptev, S. Amizadeh, and I. Flint, “Generic and scalable framework for automated time-series anomaly detection,” in Proceedings of the 21th ACM SIGKDD international conference on knowledge discovery and data mining, 2015, pp. 1939–1947.
- O. Vallis, J. Hochenbaum, and A. Kejariwal, “A novel technique for long-term anomaly detection in the cloud,” in 6th {normal-{\{{USENIX}normal-}\}} workshop on hot topics in cloud computing (HotCloud 14), 2014.
- H. Ren, B. Xu, Y. Wang, C. Yi, C. Huang, X. Kou, T. Xing, M. Yang, J. Tong, and Q. Zhang, “Time-series anomaly detection service at microsoft,” in Proceedings of the 25th ACM SIGKDD international conference on knowledge discovery & data mining, 2019, pp. 3009–3017.
- B. Hussain, Q. Du, A. Imran, and M. A. Imran, “Artificial intelligence-powered mobile edge computing-based anomaly detection in cellular networks,” IEEE Transactions on Industrial Informatics, vol. 16, no. 8, pp. 4986–4996, 2019.
- B. Hussain, Q. Du, S. Zhang, A. Imran, and M. A. Imran, “Mobile edge computing-based data-driven deep learning framework for anomaly detection,” IEEE Access, vol. 7, pp. 137 656–137 667, 2019.
- C. Yin, S. Zhang, J. Wang, and N. N. Xiong, “Anomaly detection based on convolutional recurrent autoencoder for iot time series,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 52, no. 1, pp. 112–122, 2022.
- Z. Yao, Y. Desmouceaux, J.-A. Cordero-Fuertes, M. Townsley, and T. Clausen, “Efficient data-driven network functions,” in 2022 30th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS). IEEE, 2022, pp. 152–159.
- D. Liu, Y. Zhao, H. Xu, Y. Sun, D. Pei, J. Luo, X. Jing, and M. Feng, “Opprentice: Towards practical and automatic anomaly detection through machine learning,” in Proceedings of the 2015 Internet Measurement Conference, ser. IMC ’15. New York, NY, USA: Association for Computing Machinery, 2015, p. 211–224. [Online]. Available: https://doi.org/10.1145/2815675.2815679
- H. Xu, W. Chen, N. Zhao, Z. Li, J. Bu, Z. Li, Y. Liu, Y. Zhao, D. Pei, Y. Feng, J. Chen, Z. Wang, and H. Qiao, “Unsupervised anomaly detection via variational auto-encoder for seasonal kpis in web applications,” in Proceedings of the 2018 World Wide Web Conference, ser. WWW ’18. Republic and Canton of Geneva, CHE: International World Wide Web Conferences Steering Committee, 2018, p. 187–196. [Online]. Available: https://doi.org/10.1145/3178876.3185996
- LinkedIn, “Luminol,” https://github.com/linkedin/luminol, 2021.
- B. Rosner, “Percentage points for a generalized esd many-outlier procedure,” Technometrics, vol. 25, no. 2, pp. 165–172, 1983.
- A. Antoniadis, “Wavelets in statistics: A review,” Statistical Methods and Applications, vol. 6, pp. 97–130, 08 1997.
- A. Mahimkar, Z. Ge, J. Wang, J. Yates, Y. Zhang, J. Emmons, B. Huntley, and M. Stockert, “Rapid detection of maintenance induced changes in service performance,” in Proceedings of the Seventh COnference on Emerging Networking EXperiments and Technologies, ser. CoNEXT ’11. New York, NY, USA: Association for Computing Machinery, 2011. [Online]. Available: https://doi.org/10.1145/2079296.2079309
- Y. Zhang, Z. Ge, A. Greenberg, and M. Roughan, “Network anomography,” in Proceedings of the 5th ACM SIGCOMM Conference on Internet Measurement, ser. IMC ’05. USA: USENIX Association, 2005, p. 30.
- F. Rasheed, P. Peng, R. Alhajj, and J. Rokne, “Fourier transform based spatial outlier mining,” in Proceedings of the 10th International Conference on Intelligent Data Engineering and Automated Learning, ser. IDEAL’09. Berlin, Heidelberg: Springer-Verlag, 2009, p. 317–324.
- V. Krishnan, A. Makdah, A. AlRahman, and F. Pasqualetti, “Lipschitz bounds and provably robust training by laplacian smoothing,” Advances in Neural Information Processing Systems, vol. 33, pp. 10 924–10 935, 2020.
Paper Prompts
Sign up for free to create and run prompts on this paper using GPT-5.
Top Community Prompts
Collections
Sign up for free to add this paper to one or more collections.