skip to main content
10.1145/1921168.1921172acmconferencesArticle/Chapter ViewAbstractPublication PagesconextConference Proceedingsconference-collections
research-article

Spatio-temporal patterns in network events

Published:30 November 2010Publication History

ABSTRACT

Operational networks typically generate massive monitoring data that consist of local (in both space and time) observations of the status of the networks. It is often hypothesized that such data exhibit both spatial and temporal correlation based on the underlying network topology and time of occurrence; identifying such correlation patterns offers valuable insights into global network phenomena (e.g., fault cascading in communication networks). In this paper we introduce a new class of models suitable for learning, indexing, and identifying spatio-temporal patterns in network monitoring data. We exemplify our techniques with the application of fault diagnosis in enterprise networks. We show how it can help network management systems (NMSes) to effciently detect and localize potential faults (e.g., failure of routing protocols or network equipments) by analyzing massive operational event streams (e.g., alerts, alarms, and metrics). We provide results from extensive experimental studies over real network event and topology datasets to explore the effcacy of our solution.

References

  1. HP Open View. http://www.openview.hp.com.Google ScholarGoogle Scholar
  2. IBM Tivoli Monitoring. http://www01.ibm.com/software/tivoli/products/monitor/.Google ScholarGoogle Scholar
  3. H. Akaike. A new look at the statistical model identification. IEEE Trans. Auto. Cont., 19(6), 1974.Google ScholarGoogle ScholarCross RefCross Ref
  4. D. Banerjee, V. Madduri, and M. Srivatsa. A framework for distributed monitoring and root cause analysis for large ip networks. In SRDS, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. A.-L. Barabási. Linked: The New Science of Networks. Perseus Publishing, 2002.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. A.-L. Barabási and R. Albert. Emergence of Scaling in Random Networks. Science, 286(5439):509--512, 1999.Google ScholarGoogle Scholar
  7. E. Cohen, E. Halperin, H. Kaplan, and U. Zwick. Reachability and distance queries via 2-hop labels. SIAM J. Comput., 32(5), 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. I. Cohen, S. Zhang, M. Goldszmidt, J. Symons, T. Kelly, and A. Fox. Capturing, indexing, clustering, and retrieving system history. In SOSP, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. L. Fan, P. Cao, J. Almeida, and A. Broder. Summary cache: A scalable wide-area web cache sharing protocol. In IEEE/ACM Trans. Netw., 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. A. Feldmann, O. Maennel, Z. Mao, A. Berger, and B. Maggs. Locating internet routing instabilities. SIGCOMM Comput. Commun. Rev., 34(4), 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. A. Guttman. R-trees: A dynamic index structure for spatial searching. In SIGMOD, 1984. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Y. Huang, N. Feamster, A. Lakhina, and J. Xu. Diagnosing network disruptions with network-wide analysis. SIGMETRICS Perform. Eval. Rev., 35(1), 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Internet Engineering Task Force. OSPF version 2. http://www.ietf.org/rfc.Google ScholarGoogle Scholar
  14. I. Katzela and M. Schwartz. Schemes for fault identification in communication networks. IEEE/ACM Trans. Netw., 3(6), 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. A. Lakhina, M. Crovella, and C. Diot. Mining anomalies using traffic feature distributions. SIGCOMM Comput. Commun. Rev., 35(4), 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. L. Lewis. A case-based reasoning approach to the resolution of faults in communication networks. In IM, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. J. P. Martin-Flatin, G. Jakobson, and L. Lewis. Event correlation in integrated management: Lessons learned and outlook. J. Netw. Syst. Manage., 15(4):481--502, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. X. Meng, G. Jiang, H. Zhang, H. Chen, and K. Yoshihira. Automatic profiling of network event sequences: algorithm and application. In IEEE INFOCOM, 2008.Google ScholarGoogle ScholarCross RefCross Ref
  19. Y. Nygate. Event correlation using rule and object based techniques. In IM, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. J. Pearl. Probabilistic reasoning in intelligent systems: networks of plausible inference. Morgan Kaufmann Publishers Inc., 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. T. Wang, M. Srivatsa, D. Agrawal, and L. Liu. Learning, indexing, and diagnosing network faults. In KDD, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. J. Wu, Z. Mao, J. Rexford, and J. Wang. Finding a needle in a haystack: pinpointing significant BGP routing changes in an IP network. In NSDI, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. P. Wu, R. Bhatnagar, L. Epshtein, M. Bhandaru, and S. Zhongwen. Alarm correlation engine. In NOMS, 1998.Google ScholarGoogle Scholar
  24. K. Yamasaki, K. Matia, S. V. Buldyrev, D. Fu, F. Pammolli, M. Riccaboni, and H. E. Stanley. Preferential attachment and growth dynamics in complex systems. Phys. Rev. E, 74(3), 2006.Google ScholarGoogle ScholarCross RefCross Ref
  25. S. Yemini, S. Kliger, E. Mozes, Y. Yemini, and D. Ohsie. High speed and robust event correlation. Communications Magazine, IEEE, 34(5), 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman. Sybilguard: defending against sybil attacks via social networks. In SIGCOMM, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. J. Zhang, J. Rexford, and J. Feigenbaum. Learning-based anomaly detection in BGP updates. In MineNet, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Spatio-temporal patterns in network events

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            Co-NEXT '10: Proceedings of the 6th International COnference
            November 2010
            349 pages
            ISBN:9781450304481
            DOI:10.1145/1921168

            Copyright © 2010 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 30 November 2010

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

            Acceptance Rates

            Overall Acceptance Rate198of789submissions,25%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader