An improved network performance anomaly detection and localization algorithm

In this paper, we introduce a network performance anomaly detection and localization method based on active probing, aiming at avoiding waste of unnecessary probes and reducing detecting time by decreasing selecting rounds in detection phase. We propose a method of classifying detection strategies i...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:2012 14th Asia-Pacific Network Operations and Management Symposium s. 1 - 4
Hlavní autoři: Guanjue Wang, Yan Qiao, Xuesong Qiu, Luoming Meng
Médium: Konferenční příspěvek
Jazyk:angličtina
Vydáno: IEEE 01.09.2012
Témata:
ISBN:9781467344944, 146734494X
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract In this paper, we introduce a network performance anomaly detection and localization method based on active probing, aiming at avoiding waste of unnecessary probes and reducing detecting time by decreasing selecting rounds in detection phase. We propose a method of classifying detection strategies in order to find a balance between extra calculation and link load. Also we optimized the procedures of one of the strategies so that instead of finding a local optimal solution, we get a global optimal approach. An algorithm that can adapt to multi anomaly link networks is proposed and several issues during detection phase were being discussed. Finally we simulate a former representative algorithm and our improved method on different network topologies. The results show that our improved algorithm outperforms the former one in both probe selecting rounds during detection phase by 10%.
AbstractList In this paper, we introduce a network performance anomaly detection and localization method based on active probing, aiming at avoiding waste of unnecessary probes and reducing detecting time by decreasing selecting rounds in detection phase. We propose a method of classifying detection strategies in order to find a balance between extra calculation and link load. Also we optimized the procedures of one of the strategies so that instead of finding a local optimal solution, we get a global optimal approach. An algorithm that can adapt to multi anomaly link networks is proposed and several issues during detection phase were being discussed. Finally we simulate a former representative algorithm and our improved method on different network topologies. The results show that our improved algorithm outperforms the former one in both probe selecting rounds during detection phase by 10%.
Author Yan Qiao
Xuesong Qiu
Guanjue Wang
Luoming Meng
Author_xml – sequence: 1
  surname: Guanjue Wang
  fullname: Guanjue Wang
  email: guanjuewang@bupt.edu.cn
  organization: State Key Lab. of Networking & Switching Technol., Beijing Univ. of Posts & Telecommun., Beijing, China
– sequence: 2
  surname: Yan Qiao
  fullname: Yan Qiao
  organization: State Key Lab. of Networking & Switching Technol., Beijing Univ. of Posts & Telecommun., Beijing, China
– sequence: 3
  surname: Xuesong Qiu
  fullname: Xuesong Qiu
  organization: State Key Lab. of Networking & Switching Technol., Beijing Univ. of Posts & Telecommun., Beijing, China
– sequence: 4
  surname: Luoming Meng
  fullname: Luoming Meng
  organization: State Key Lab. of Networking & Switching Technol., Beijing Univ. of Posts & Telecommun., Beijing, China
BookMark eNo1j8tOwzAURI0ACVryBd3kB1psX8ePZVTxkgJFovvKcW7AkNiRE4HK11OpZTZHcxYjzYxchBiQkAWjK8aouS1fXzbPbytOGV9JKCQVxRmZMSEVCGEKfU4yo_R_F-KKZOP4SQ_RnIHW16QqQ-77IcVvbPKA009MX_mAqY2pt8FhbkPsbbfPG5zQTT6Gg2nyLjrb-V97FN17TH766G_IZWu7EbMT52R7f7ddPy6rzcPTuqyW3tBpicZo5WTD0DqKylFaS9pwri1YpQBaqVgragQHNZiaF0BlYzg4Z7SrCwtzsjjOekTcDcn3Nu13p__wBw94UiI
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/APNOMS.2012.6356045
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE/IET Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISBN 1467344958
9781467344968
9781467344951
1467344966
EndPage 4
ExternalDocumentID 6356045
Genre orig-research
GroupedDBID 6IE
6IF
6IK
6IL
6IN
AAJGR
AAWTH
ADFMO
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
IEGSK
IERZE
OCL
RIE
RIL
ID FETCH-LOGICAL-i90t-e9987c6d1eac0e7c00b60d228a3a7733f671f4be3c3b39b25306d923cc98cb5a3
IEDL.DBID RIE
ISBN 9781467344944
146734494X
IngestDate Wed Aug 27 03:29:18 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i90t-e9987c6d1eac0e7c00b60d228a3a7733f671f4be3c3b39b25306d923cc98cb5a3
PageCount 4
ParticipantIDs ieee_primary_6356045
PublicationCentury 2000
PublicationDate 2012-Sept.
PublicationDateYYYYMMDD 2012-09-01
PublicationDate_xml – month: 09
  year: 2012
  text: 2012-Sept.
PublicationDecade 2010
PublicationTitle 2012 14th Asia-Pacific Network Operations and Management Symposium
PublicationTitleAbbrev APNOMS
PublicationYear 2012
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0000821388
Score 1.5011824
Snippet In this paper, we introduce a network performance anomaly detection and localization method based on active probing, aiming at avoiding waste of unnecessary...
SourceID ieee
SourceType Publisher
StartPage 1
SubjectTerms active probing
anomaly detection
anomaly localization
Bandwidth
Classification algorithms
Loss measurement
Monitoring
network performance management
Network topology
Probes
Radiation detectors
Title An improved network performance anomaly detection and localization algorithm
URI https://ieeexplore.ieee.org/document/6356045
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV07T8MwELZKxQALjxbxlgdG0jq2EztjhagYoFSiQ7fKjwtEapOqpEj8exwntCCxsNkeLPss-Xzn7_sOoRsKsZJEh0HIrHIBShoFysQysBKESq0xCdW-2IQYjeR0moxb6HbDhQEADz6DXtX0f_m2MOsqVdavtNTcE2QH7QgR11ytTT7FubKQSem5W7FgnCd8-i3p1PR5ozoUkqQ_GI-en14qaBftNdP-qq_i3cvw4H8LO0TdLU8Pjzce6Ai1ID9G-z8kBjvocZDjzCcOwOK8xnzj5ZYtgFVeLNT8E1soPSordyMWexfXUDSxmr8Wq6x8W3TRZHg_uXsImgoKQZaQMgAXSwkT29DdrgSEIUTHxFIqFVNCMJbGIky5BmaYZommkYsfrHvxuROSRkeKnaB2XuRwijClKo0AFBBlubJKuq2pmOqUCMsND89QpzLLbFlrZMwai5z_PXyB9irL11itS9QuV2u4Qrvmo8zeV9f-YL8ABxqjdg
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3PT8IwFG4QTdSLP8D42x48Oujabe2OxEgwwiSRAzfStW-6BDaCw8T_3q5M0MSLt7aHpu1L-vpev-97CN1SCKQgseu4TEsToCS-I1UgHC2Ay0QrFdLYFpvgUSTG43BYQ3drLgwAWPAZtMqm_cvXuVqWqbJ2qaVmniBbaLusnFWxtdYZFePMXCaEZW8FnHle6I2_RZ2qvlfpDrkkbHeG0fPgpQR30VY18a8KK9bBdA_-t7RD1Nww9fBw7YOOUA2yY7T_Q2SwgfqdDKc2dQAaZyvUN55v-AJYZvlMTj-xhsLisjIzorF1chVJE8vpa75Ii7dZE426D6P7nlPVUHDSkBQOmGiKq0C75n4lwBUhcUA0pUIyyTljScDdxIuBKRazMKa-iSC0efMZGwkV-5KdoHqWZ3CKMKUy8QEkEKk9qaUwW5MBjRPCtac89ww1ymOZzFcqGZPqRM7_Hr5Bu73RoD_pP0ZPF2ivtMIKuXWJ6sViCVdoR30U6fvi2hr5C7xYpr8
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2012+14th+Asia-Pacific+Network+Operations+and+Management+Symposium&rft.atitle=An+improved+network+performance+anomaly+detection+and+localization+algorithm&rft.au=Guanjue+Wang&rft.au=Yan+Qiao&rft.au=Xuesong+Qiu&rft.au=Luoming+Meng&rft.date=2012-09-01&rft.pub=IEEE&rft.isbn=9781467344944&rft.spage=1&rft.epage=4&rft_id=info:doi/10.1109%2FAPNOMS.2012.6356045&rft.externalDocID=6356045
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781467344944/lc.gif&client=summon&freeimage=true
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781467344944/mc.gif&client=summon&freeimage=true
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781467344944/sc.gif&client=summon&freeimage=true