Skip to main content

2020 | OriginalPaper | Buchkapitel

Smart Incident Management, Prediction Engine and Performance Enhancement

verfasst von : Jamal El Abdelkhalki, Mohamed Ben Ahmed

Erschienen in: Innovations in Smart Cities Applications Edition 3

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The rapid growth of the Internet has resulted in an exponential increase in the type and frequency of anomalies, and many of the well-known anomaly detection solutions are in place.
However, each computer system collects information about the different tasks performed. Each piece of information is stored in specific files called log files. The log files consist of log messages or simply journal. A log message is what a computer system, software. Generate in response to some kind of stimulation. The information that has removed a log message and declares that the log message was generated is called log data. A common log message contains the timestamp, source, and data. The timestamp indicates the time at which the login message was created. The source is the system that created the log message and the data is the core of the log message. Unfortunately, this format is not a standard; A log message can be significantly different from one system to another. Classification is an important data mining technique with broad applications. It classifies data of various kinds.
This paper has been carried out to make a performance evaluation of KNN, J48 and – Naive Bayes classification algorithm and sets out to make comparative evaluation of classifiers in the context of dataset.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Li, W.: Automatic log analysis using machine learning: awesome automatic log analysis version 2.0 (2013) Li, W.: Automatic log analysis using machine learning: awesome automatic log analysis version 2.0 (2013)
2.
Zurück zum Zitat Vijayarani, S., Dhayanand, S.: Data mining classification algorithms for kidney disease prediction. Int. J. Cybern. Inform. 4(4), 13–25 (2015) Vijayarani, S., Dhayanand, S.: Data mining classification algorithms for kidney disease prediction. Int. J. Cybern. Inform. 4(4), 13–25 (2015)
3.
Zurück zum Zitat El Abdelkhalki, J., Ben Ahmed, M., Anouar, B.H.: Classification and exploration of TSM log file based on datamining algorithms. In: Proceedings of the 2nd International Conference on Computing and Wireless Communication Systems – ICCWCS 2017, Larache, Morocco, pp. 1–7 (2017) El Abdelkhalki, J., Ben Ahmed, M., Anouar, B.H.: Classification and exploration of TSM log file based on datamining algorithms. In: Proceedings of the 2nd International Conference on Computing and Wireless Communication Systems – ICCWCS 2017, Larache, Morocco, pp. 1–7 (2017)
4.
Zurück zum Zitat Balliu, A., Olivetti, D., Babaoglu, O., Marzolla, M., Sîrbu, A.: A big data analyzer for large trace logs. Computing 98(12), 1225–1249 (2016)MathSciNetCrossRef Balliu, A., Olivetti, D., Babaoglu, O., Marzolla, M., Sîrbu, A.: A big data analyzer for large trace logs. Computing 98(12), 1225–1249 (2016)MathSciNetCrossRef
5.
Zurück zum Zitat Zou, D.-Q., Qin, H., Jin, H.: UiLog: improving log-based fault diagnosis by log analysis. J. Comput. Sci. Technol. 31(5), 1038–1052 (2016)CrossRef Zou, D.-Q., Qin, H., Jin, H.: UiLog: improving log-based fault diagnosis by log analysis. J. Comput. Sci. Technol. 31(5), 1038–1052 (2016)CrossRef
6.
Zurück zum Zitat Heikkinen, E., Hämäläinen, T.D.: Behavior mining language for mining expected behavior from log files. In: IECON 2016 - 42nd Annual Conference of the IEEE Industrial Electronics Society, pp. 4613–4618 (2016) Heikkinen, E., Hämäläinen, T.D.: Behavior mining language for mining expected behavior from log files. In: IECON 2016 - 42nd Annual Conference of the IEEE Industrial Electronics Society, pp. 4613–4618 (2016)
9.
Zurück zum Zitat Gutierrez, R.J., Bauer, K.W., Boehmke, B.C., Saie, C.M., Bihl, T.J.: Cyber anomaly detection: using tabulated vectors and embedded analytics for efficient data mining. J. Algorithms Comput. Technol. 12(4), 293–310 (2018)MathSciNetCrossRef Gutierrez, R.J., Bauer, K.W., Boehmke, B.C., Saie, C.M., Bihl, T.J.: Cyber anomaly detection: using tabulated vectors and embedded analytics for efficient data mining. J. Algorithms Comput. Technol. 12(4), 293–310 (2018)MathSciNetCrossRef
10.
Zurück zum Zitat Suh-Lee, C., Jo, J.-Y., Kim, Y.: Text mining for security threat detection discovering hidden information in unstructured log messages. In: 2016 IEEE Conference on Communications and Network Security (CNS), pp. 252–260 (2016) Suh-Lee, C., Jo, J.-Y., Kim, Y.: Text mining for security threat detection discovering hidden information in unstructured log messages. In: 2016 IEEE Conference on Communications and Network Security (CNS), pp. 252–260 (2016)
11.
Zurück zum Zitat Saurabh, K., Beedgen, C.F., Kurtic, B.: Log data analysis. US9262519B1, 16 févr 2016 Saurabh, K., Beedgen, C.F., Kurtic, B.: Log data analysis. US9262519B1, 16 févr 2016
12.
Zurück zum Zitat Narkhede, S., Baraskar, T.: HMR log analyzer: analyze web application logs over hadoop mapreduce. Int. J. UbiComp 4(3), 41–51 (2013)CrossRef Narkhede, S., Baraskar, T.: HMR log analyzer: analyze web application logs over hadoop mapreduce. Int. J. UbiComp 4(3), 41–51 (2013)CrossRef
13.
Zurück zum Zitat Nagaraj, K., Killian, C., Neville, J.: Structured comparative analysis of systems logs to diagnose performance problems. In: Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation, pp. 26–26 (2012) Nagaraj, K., Killian, C., Neville, J.: Structured comparative analysis of systems logs to diagnose performance problems. In: Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation, pp. 26–26 (2012)
15.
Zurück zum Zitat Lemoudden, M., Amar, M., Ouahidi, B.E.: A binary-based mapreduce analysis for cloud logs. Procedia Comput. Sci. 83, 1213–1218 (2016)CrossRef Lemoudden, M., Amar, M., Ouahidi, B.E.: A binary-based mapreduce analysis for cloud logs. Procedia Comput. Sci. 83, 1213–1218 (2016)CrossRef
16.
Zurück zum Zitat Gutierrez, R.J., Boehmke, B.C., Bauer, K.W., Saie, C.M., Bihl, T.J.: anomalyDetection: implementation of augmented network log anomaly detection procedures. R J. 9(2), 354 (2017)CrossRef Gutierrez, R.J., Boehmke, B.C., Bauer, K.W., Saie, C.M., Bihl, T.J.: anomalyDetection: implementation of augmented network log anomaly detection procedures. R J. 9(2), 354 (2017)CrossRef
17.
Zurück zum Zitat Juvonen, A., Sipola, T., Hämäläinen, T.: Online anomaly detection using dimensionality reduction techniques for HTTP log analysis. Comput. Netw. 91, 46–56 (2015)CrossRef Juvonen, A., Sipola, T., Hämäläinen, T.: Online anomaly detection using dimensionality reduction techniques for HTTP log analysis. Comput. Netw. 91, 46–56 (2015)CrossRef
18.
Zurück zum Zitat Yin, C., Zhu, Y., Fei, J., He, X.: A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access 5, 21954–21961 (2017)CrossRef Yin, C., Zhu, Y., Fei, J., He, X.: A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access 5, 21954–21961 (2017)CrossRef
19.
Zurück zum Zitat Aburomman, A.A., Ibne Reaz, M.B.: A novel SVM-kNN-PSO ensemble method for intrusion detection system. Appl. Soft Comput. 38, 360–372 (2016)CrossRef Aburomman, A.A., Ibne Reaz, M.B.: A novel SVM-kNN-PSO ensemble method for intrusion detection system. Appl. Soft Comput. 38, 360–372 (2016)CrossRef
20.
Zurück zum Zitat Maniya, H., Hasan, M., Patel, K.P.: Comparative study of naïve Bayes classifier and KNN for tuberculosis. In: International Conference on Web Services Computing (ICWSC), pp. 22–26 (2011) Maniya, H., Hasan, M., Patel, K.P.: Comparative study of naïve Bayes classifier and KNN for tuberculosis. In: International Conference on Web Services Computing (ICWSC), pp. 22–26 (2011)
21.
Zurück zum Zitat Khamar, K.: Short text classification using kNN based on distance function. Int. J. Adv. Res. Comput. Commun. Eng. 2(4), 1916–1919 (2013) Khamar, K.: Short text classification using kNN based on distance function. Int. J. Adv. Res. Comput. Commun. Eng. 2(4), 1916–1919 (2013)
22.
Zurück zum Zitat Amornsinlaphachai, P.: Efficiency of data mining models to predict academic performance and a cooperative learning model. In: 2016 8th International Conference on Knowledge and Smart Technology (KST), pp. 66–71 (2016) Amornsinlaphachai, P.: Efficiency of data mining models to predict academic performance and a cooperative learning model. In: 2016 8th International Conference on Knowledge and Smart Technology (KST), pp. 66–71 (2016)
23.
Zurück zum Zitat Mehedy, S.R., Jhalak, A.: Classification rules comparison into data mining concept, p. 9, September 2018 Mehedy, S.R., Jhalak, A.: Classification rules comparison into data mining concept, p. 9, September 2018
24.
Zurück zum Zitat Joshi, S., Nair, M.K.: Prediction of heart disease using classification based data mining techniques. In: Computational Intelligence in Data Mining - Volume 2, pp. 503–511 (2015) Joshi, S., Nair, M.K.: Prediction of heart disease using classification based data mining techniques. In: Computational Intelligence in Data Mining - Volume 2, pp. 503–511 (2015)
25.
Zurück zum Zitat Kégl, B.: Contributions to machine learning: the unsupervised, the supervised, and the Bayesian, p. 108, September 2011 Kégl, B.: Contributions to machine learning: the unsupervised, the supervised, and the Bayesian, p. 108, September 2011
26.
Zurück zum Zitat Knights, D., Costello, E.K., Knight, R.: Supervised classification of human microbiota. FEMS Microbiol. Rev. 35(2), 343–359 (2011)CrossRef Knights, D., Costello, E.K., Knight, R.: Supervised classification of human microbiota. FEMS Microbiol. Rev. 35(2), 343–359 (2011)CrossRef
27.
Zurück zum Zitat Laloë, T.: Sur quelques problèmes d’apprentissage supervisé et non supervisé, p. 173, February 2010 Laloë, T.: Sur quelques problèmes d’apprentissage supervisé et non supervisé, p. 173, February 2010
28.
Zurück zum Zitat Benzaki, Y.: Introduction à l’algorithme k Nearest Neighbors (KNN). Mr. Mint: Apprendre le Machine Learning de A à Z, 02 October 2018 Benzaki, Y.: Introduction à l’algorithme k Nearest Neighbors (KNN). Mr. Mint: Apprendre le Machine Learning de A à Z, 02 October 2018
29.
Zurück zum Zitat Patil, T.R., Sherekar, S.S.: Performance analysis of Naive Bayes and J48 classification algorithm for data classification. Open Access 6, 6 (2013) Patil, T.R., Sherekar, S.S.: Performance analysis of Naive Bayes and J48 classification algorithm for data classification. Open Access 6, 6 (2013)
30.
Zurück zum Zitat Dunham, M.H.: Data Mining: Introductory and Advanced Topics. Prentice Hall PTR, Upper Saddle River (2002) Dunham, M.H.: Data Mining: Introductory and Advanced Topics. Prentice Hall PTR, Upper Saddle River (2002)
31.
Zurück zum Zitat Rajeswari, V., Arunesh, K.: Analysing soil data using data mining classification techniques. Indian J. Sci. Technol. 9(19), 1–4 (2016)CrossRef Rajeswari, V., Arunesh, K.: Analysing soil data using data mining classification techniques. Indian J. Sci. Technol. 9(19), 1–4 (2016)CrossRef
Metadaten
Titel
Smart Incident Management, Prediction Engine and Performance Enhancement
verfasst von
Jamal El Abdelkhalki
Mohamed Ben Ahmed
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-37629-1_73

    Premium Partner