Weighted Association Patterns Mining Algorithm and its Application to Alarm Correlation Analysis in Communication Network

Author(s):  
Jing-Yao Feng ◽  
Xing-Ming Li
2014 ◽  
Vol 989-994 ◽  
pp. 2237-2240
Author(s):  
Hui Sheng Gao ◽  
Ying Min Li

In this article we achieve SDH communication network correlation analysis by the confidence fusion algorithm. We take the effect of the alarm topology relationship on the alarm timing relationship into the calculation process of confidence fusion algorithm .Thus it can get alarm correlation results more in line with objective facts. According to the correlation calculation results it forms the alarm correlation transactions, then applying the alarm correlation transactions to the alarm association rules mining. We compare the mining results with the traditional method based on sliding window. The experimental results show that the mining results are more effective after introducing the confidence fusion algorithm.


2021 ◽  
Vol 2021 ◽  
pp. 1-7
Author(s):  
Kai Ji

Wireless personal communication network is easily affected by intrusion data in the communication process, resulting in the inability to ensure the security of personal information in wireless communication. Therefore, this paper proposes a malicious intrusion data mining algorithm based on legitimate big data in wireless personal communication networks. The clustering algorithm is used to iteratively obtain the central point of malicious intrusion data and determine its expected membership. The noise in malicious intrusion data is denoised by objective function, and the membership degree of communication data is calculated. The change factor of the neighborhood center of gravity of malicious intrusion data in wireless personal communication network is determined, the similarity between the characteristics of malicious intrusion data by using the Markov distance was determined, and the malicious intrusion data mining of wireless personal communication network supported by legal big data was completed. The experimental results show that the accuracy of mining malicious data is high and the mining time is short.


2014 ◽  
Vol 556-562 ◽  
pp. 6191-6195
Author(s):  
Yong Wei Wang ◽  
Hui Fang Su ◽  
Wei Qiu

This paper proposes a correlation analysis method based on fuzzy rules and artificial immune. Firstly, we adopt the alarms selection algorithm based on a sliding time window to improve the efficiency of selected alarm. Secondly, the analysis method based on fuzzy correlation rules is used to associate the known patterns static and rapidly. Then, using a method based on immune evolution to improve and adaptive the antibody so as to achieve the dynamic, intelligent correlation of unknown model. The experimental results in LLDOS1.0 and LLDOS2.0 show that the new method gets better accuracy than typical correlation methods, which can ensure the efficiency of correlation analysis and the adaptability of the correlation method.


Sign in / Sign up

Export Citation Format

Share Document