2015
DOI: 10.1109/tkde.2015.2426713
|View full text |Cite
|
Sign up to set email alerts
|

Four Decades of Data Mining in Network and Systems Management

Abstract: How has the interdisciplinary data mining field been practiced in Network and Systems Management (NSM)? In Science and Technology, there is a wide use of data mining in areas like bioinformatics, genetics, Web and more recently astroinformatics. However, the application in NSM has been limited and inconsiderable. In this article, we provide an account of how data mining has been applied in managing networks and systems for the past four decades, presumably since its birth. We look into the field's applications… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 15 publications
(6 citation statements)
references
References 90 publications
(179 reference statements)
0
6
0
Order By: Relevance
“…One of the possible solutions to address changing operational conditions and low frequency of faults is to incorporate the domain knowledge in the pattern detection process. For example, Kalegele et al [ 29 ] proposed utilisation of the domain knowledge of network management software systems by ETL (extract, transform, load) units during data mining. This enabled the unit to improve the value of the insight generated from system operational data.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…One of the possible solutions to address changing operational conditions and low frequency of faults is to incorporate the domain knowledge in the pattern detection process. For example, Kalegele et al [ 29 ] proposed utilisation of the domain knowledge of network management software systems by ETL (extract, transform, load) units during data mining. This enabled the unit to improve the value of the insight generated from system operational data.…”
Section: Related Workmentioning
confidence: 99%
“… Mind map of the concepts from the literature review used for anomaly detection [ 10 , 11 , 12 , 13 , 14 , 15 , 16 , 17 , 18 , 19 , 20 , 21 , 22 , 23 , 24 , 25 , 26 , 27 , 28 , 29 ]. …”
Section: Figurementioning
confidence: 99%
“…Since the 1990s, sophisticated intrusion detection systems have been made with the help of data mining. Data mining techniques in general, and machine learning techniques in particular, must be applied in five steps: selection, preprocessing, transformation, mining, and interpretation [3], [4]. Out of all the ways to find intrusions using data mining, these three important steps are the hardest.…”
Section: Introductionmentioning
confidence: 99%
“…Machine learning approaches are typically employed in the four primary steps in the learning process (preprocessing, mining, transformation, and interpretation) [4], [5]. The multidimensional challenge's [6] complexity makes it difficult for classification techniques to accurately find PortScan attack [7].…”
mentioning
confidence: 99%