2018
DOI: 10.1109/tnsm.2017.2778096
|View full text |Cite
|
Sign up to set email alerts
|

Mining Causality of Network Events in Log Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
33
0
1

Year Published

2018
2018
2021
2021

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 46 publications
(34 citation statements)
references
References 31 publications
0
33
0
1
Order By: Relevance
“…More specifically, we used 85% of the recording (130 days) to train our method (i.e., optimising the free parameters) and the remaining 15% (21 days) to compute the functional connectivity. To maintain consistency with the method of Kobayashi et al [3], the window (i.e., the unit of adaptation time, i.e., when probabilities are updated) was set to 1 day. The maximum delay τ max over which cross-correlations were calculated was set to 120s.…”
Section: B Validation: Pseudo-ground Truthmentioning
confidence: 99%
See 3 more Smart Citations
“…More specifically, we used 85% of the recording (130 days) to train our method (i.e., optimising the free parameters) and the remaining 15% (21 days) to compute the functional connectivity. To maintain consistency with the method of Kobayashi et al [3], the window (i.e., the unit of adaptation time, i.e., when probabilities are updated) was set to 1 day. The maximum delay τ max over which cross-correlations were calculated was set to 120s.…”
Section: B Validation: Pseudo-ground Truthmentioning
confidence: 99%
“…The aggregate rate of collected events is commonly high due to the very large number of monitored devices and services; a typical rate for a large-scale network deployment would be 10 6 events per second [2]. However, although the aggregate event rate is large, the rate at which individual devices emit events is extremely low such that correlating emitted events is inherently challenging; this becomes even more cumbersome in the presence of periodical informational events [3]. In addition, the vast majority of collected event data is noise and only a few of them may correlate with actionable incidents.…”
mentioning
confidence: 99%
See 2 more Smart Citations
“…When a system is monitored there are several sources of information one can use for cause analysis, spanning from network measures 12 down to daemon logs. 13 To perform such analysis there is a need for a large amount of data which in the past was approached in several ways, for instance, with local processing 14 or with distributed data collection. 15 Yet, cross-layer analysis is generally hard to carry-on especially in multidomain networks.…”
Section: State Of the Artmentioning
confidence: 99%