2017
DOI: 10.1016/j.cherd.2015.06.019
|View full text |Cite
|
Sign up to set email alerts
|

A method for pattern mining in multiple alarm flood sequences

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
7
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 55 publications
(7 citation statements)
references
References 26 publications
0
7
0
Order By: Relevance
“…These tools help in detecting disruption situations before they happen, and search for an alternative to reduce the damages and/or performances loss made by these unexpected events. In such context, machine learning algorithms are widely used to predict unexpected events and hence to detect performance degradation of running systems [25]. However, traditional machine learning schemes are centralized in nature i.e.…”
Section: Introductionmentioning
confidence: 99%
“…These tools help in detecting disruption situations before they happen, and search for an alternative to reduce the damages and/or performances loss made by these unexpected events. In such context, machine learning algorithms are widely used to predict unexpected events and hence to detect performance degradation of running systems [25]. However, traditional machine learning schemes are centralized in nature i.e.…”
Section: Introductionmentioning
confidence: 99%
“…Thousands of alerts in a short time require analysts to spend considerable time to conclude whether there is an occurrence of an actual intrusion or the alert is a result of excessive caution [12]. Some studies have attempted to extract alerts with pattern mining [13,14], correlation of alerts [15], flood sequence [16], etc. However, they also require supplemental setup as IDS reduces some false alerts even if it is set up appropriately.…”
Section: Introductionmentioning
confidence: 99%
“…In general, alarm pattern analysis can be first used to extract alarm groups from online alarm messages based on the similarity identification . Once the alarm patterns are discovered, causality analysis can be applied to recover the connections between the alarm tags in the pattern sequences and trace the root cause . Causality analysis provides an accessible manner for the alarm root-cause diagnosis as a causal network can capture process dependency and allow investigation of alarm propagation pathways .…”
Section: Introductionmentioning
confidence: 99%