期刊文献+

基于ACE并发编程模式的告警关联系统设计与实现 被引量:2

Design and Implementation of Alarms Correlation System Based on ACE Concurrent Programming Pattern
在线阅读 下载PDF
导出
摘要 对告警进行关联处理,减少冗余告警,增强告警的故障检测能力,是网络管理系统需要解决的关键问题。本文充分考虑电信运营网络管理可能出现的各种关联情况,定义了告警关联规则,运用ACE(Adapter Communication Environment,自适配通信环境)的ACE_task组件设计并实现了告警关联系统。实验表明,该系统能有效剔除冗余告警,及时上报故障,方便客户定位故障。
出处 《计算机系统应用》 2007年第11期6-11,共6页 Computer Systems & Applications
基金 国家杰出青年科学基金(No.60525110) 国家973计划项目(No.2007CB307100 2007CB307103) 新世纪优秀人才支持计划(No.NCET-04-0111) 电子信息产业发展基金项目(基于3G的移动业务应用系统) 国家高技术产业化信息化装备专项项目(支持数据增值业务的移动智能网系统)
关键词 ACE FSM 有向图
  • 相关文献

参考文献5

  • 1Syyid U著,马维达译,自适配通信环境中文技术文档[EB/OL],http://www.flyingdonkey.com/ace/,2003-6.
  • 2Schmidt, D C. Tasks and Adive Objeds: Patterns for Concurrent Programming [ M]. Pattem Languages of Program Design, MA:Addison - Wesley, 1995.
  • 3唐勇,张欣,周明天.一种基于FSM的告警事件关联方法[J].计算机应用研究,2006,23(9):243-246. 被引量:5
  • 4Alan Shalloway,James R.Trott著,熊节译,设计模式精解,机械工业出版社,2006.1.
  • 5李永忠,孙彦,罗军生.WINEPI挖掘算法在入侵检测中的应用[J].计算机工程,2006,32(23):159-161. 被引量:11

二级参考文献11

  • 1Mouayad Albaghdadi,et al.A Framework for Event Correlation in Communication Systems[C].IFIP/IEEE Internation Conference on Management of Multimedia Networks and Services,MMNS,2001.271-284.
  • 2Mal gorzata Steinder,Adarshpal S Sethi.Probabilistic Fault Localization in Communication Systems Using Belief Networks[J].IEEE/ACM Transactions on Networking,2004,12(5):809-822.
  • 3Malgorzata Steinder,Adarshpal S Sethi.A Survey of Fault Localization Techniques in Computer Networks[J].Science of Computer Programming,2004,53(2):165-194.
  • 4Ehab Al-Shaer.Active Management Framework for Distributed Multimedia Systems[J].Journal of Network and System Management,2000,8(1):49-72
  • 5Alarm Reporting Function[S].ITU_T X.733-1992.
  • 6Gabriel Jakobson,MarkD Weissman.Alarm Correlation:Correlating Multiple Network Alarms Improves Telecommunications Network Surveillance and Fault Management[J].IEEE Network,1993,(11):52-59.
  • 7GaltonA,J C Augusto.Two Approaches to Event Definition[C].France:Proc.of the 13th Int.Conference on Database and Expert Systems Applications,Lecture Notes in Computer Science 2453,2002.
  • 8Weeke L.A Data Mining for Constructing Feature and Model for Intrusion Detection System[D].Columbia:Columbia University,1999.
  • 9Weeke L,Stolfo J,Mok K W.Algorithms for Mining System Audit Data[C].Proceedings of the IEEE Symposium on Security and Privact,1999.
  • 10Peng N,Yun C,Reeves D S.Analyzing Intensive Intrusion Alerts via Correlation[C].Proc.of the 5^th International Symposium on Recent Advance in Intrusion Detection,Zurich,Switzerland,2002.

共引文献14

同被引文献14

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部