Network Fault Analysis based on Machine Learning

Slides:



Advertisements
Similar presentations
Stonesoft Roadmap WHAT FEATURES WILL COME IN
Advertisements

Telecommunications Management /635 Network Management.
Detectability of Traffic Anomalies in Two Adjacent Networks Augustin Soule, Haakon Ringberg, Fernando Silveira, Jennifer Rexford, Christophe Diot.
Program Systems Institute RAS FLAME FunctionaL Active Monitoring Environment.
1 BGP Anomaly Detection in an ISP Jian Wu (U. Michigan) Z. Morley Mao (U. Michigan) Jennifer Rexford (Princeton) Jia Wang (AT&T Labs)
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 4 Installing and Configuring the Dynamic Host Configuration Protocol.
FireClass FC501. What’s FC501 ? An entry level Triple Circuit Single Loop addressable system featuring Intelli-Zone mapping An “out of the box” panel.
TM Breakout Sessions Interactive and discussion-oriented Six major topic areas Sign up sheets Moderator designated for each session Recorder needed Discussion.
ADMS Automatic Data Master Server
1 Finding a Needle in a Haystack: Pinpointing Significant BGP Routing Changes in an IP Network Jian Wu (University of Michigan) Z. Morley Mao (University.
Traffic Engineering With Traditional IP Routing Protocols
1 Experiments and Tools for DDoS Attacks Roman Chertov, Sonia Fahmy, Rupak Sanjel, Ness Shroff Center for Education and Research in Information Assurance.
Dynamics of Hot-Potato Routing in IP Networks Renata Teixeira (UC San Diego) with Aman Shaikh (AT&T), Tim Griffin(Intel),
1 Automatic Meter Reading in Electronic Power Measurement Proposal based on AMR 2000.
HiVision SNMP Software.
1.  TCP/IP network management model: 1. Management station 2. Management agent 3. „Management information base 4. Network management protocol 2.
Firewall Typical Networking and Troubleshooting Common Faults.
Net Optics Confidential and Proprietary Net Optics appTap Intelligent Access and Monitoring Architecture Solutions.
Authors Renata Teixeira, Aman Shaikh and Jennifer Rexford(AT&T), Tim Griffin(Intel) Presenter : Farrukh Shahzad.
Microsoft ® Official Course Module 10 Optimizing and Maintaining Windows ® 8 Client Computers.
Next-Generation IDS: A CEP Use Case in 10 Minutes 3rd Draft – November 8, nd Event Processing Symposium Redwood Shores, California Tim Bass, CISSP.
WavioNet 2.0. Proprietary Information. 2 Objective Introduce WavioNet application NMS Learn how to perform basic device management Understand WavioNet.
Real Time Monitors, Inc. Switch Expert™. 2 Switch Expert™ Overview Switch Expert ™ (SE) currently deployed at 80% percent of the INSIGHT-100.
EMC Smarts Managing IT From A Business Perspective
Options OReS Online Registration System. System Features Event Registration: User profile management Custom defined registration fields Transportation.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 4 Installing and Configuring the Dynamic Host Configuration Protocol.
Eclipse EHX System Diagnostic tools. DIAGNOSTIC TOOLS IN EHX.
802.11n Sniffer Design Overview Vladislav Mordohovich Igor Shtarev Luba Brouk.
1 Figure 10-4: Intrusion Detection Systems (IDSs) HOST IDSs  Protocol Stack Monitor (like NIDS) Collects the same type of information as a NIDS Collects.
CCNA4 v3 Module 6 v3 CCNA 4 Module 6 JEOPARDY K. Martin.
+ Logentries Is a Real-Time Log Analytics Service for Aggregating, Analyzing, and Alerting on Log Data from Microsoft Azure Apps and Systems MICROSOFT.
Network management Network management refers to the activities, methods, procedures, and tools that pertain to the operation, administration, maintenance,
Redmond Protocols Plugfest 2016 Matt Kurjanowicz Hyper-V Networked Storage: MS-HVRS, MS-SQOS, MS-RSVD, MS-VHDX, MS- HRL updates Senior Software Engineer.
Fault Localization via Analysis of Network Dependency Victor Bahl, Ranveer Chandra, Albert Greenberg, Dave Maltz, Ming Zhang (MSR Redmond)
Some Great Open Source Intrusion Detection Systems (IDSs)

IoT Security Part 2, The Malware
Chapter 19: Network Management
Eclipse EHX System Diagnostic tools
Wi-Fi Business Networking
HUAWEI eSight: Converged Management Solution for Safe City
Redcell™ Management Essentials, Juniper Networks Enterprise Edition
Success Stories.
Security service management of tomorrow
Lec 5: SNMP Network Management
Success Stories.
Pilot Watcher Product Overview V5.3
OptiView™ XG Network Analysis Tablet
Jian Wu (University of Michigan)
Predicting Interface Failures For Better Traffic Management.
IETF 96 Berlin, Germany Key Chain Yang Data Model
Make Predictions Using Azure Machine Learning Studio
Technology & Analytics
VCE Practice Test Questions Answers
Machine Learning With Python Sreejith.S Jaganadh.G.
2018 Huawei H Real Questions Killtest
Cisco Real Exam Dumps IT-Dumps
Outline Overview Development Tools
CANalytics TM CAN Interface Software BY.
ARTIFICIAL INTELLIGENCE IN SOFTWARE TESTING
IPRS-7 IP/GPRS Receiver Software
KEEPING IT UP How To Build a Redundant, Fault Tolerant, Load Balanced, Traffic Managed Wireless network a bella mia company.
Lec 5: SNMP Network Management
Hardware Hash Quality Assurance Tool V2
AIMS Equipment & Automation monitoring solution
Dynatrace AI Demystified
Scrumium NetBrain Thursday, May 09, 2019.
Yining ZHAO Computer Network Information Center,
What’s Happening with my App, Application Insights?
Network Monitoring System
Presentation transcript:

Network Fault Analysis based on Machine Learning Research on Network Fault Analysis based on Machine Learning Haibin Song (speaker), (haibin.song@huawei.com) Liang Zhang (zhangliang1@huawei.com)

Example Scenario of Big data analysis Goal:Combine the offline and online analysis system to support the fast recovery of fault Online Analysis: Deployed in customer side, detect the fault at real-time, could give out the advice Offline Analysis: Deployed in TAC/GTAC, provide the service for the global customs, help engineer to locate the fault and give the advice Diagnose Conclusion(Advice) Operator NOC 1 Online Analysis TAC/GTAC IP Network Advice Collecting data-set 2 Offline Analysis Send back the data-set Online system Offline system No System User Feature 1 Online Analysis Customer Proactive monitoring of the state of functioning and health of telecommunication equipment The detection of the earliest symptoms of a malfunction for network devices Correlation analysis on the basis of the multiple data sets 2 Offline Analysis TAC/GTAC Data Visualization to help user get the insight to the fault. The detection of the fault of a malfunction for network devices

Offline Scenario for Fault Analysis Data upload Automatic Fault Analysis Visualization KPI Analysis Place A Traffic anomaly Place B Related analysis 17:20 shutdown Command 17:20 Fault information Anomaly analysis Correlation analysis items support 1 {BFD BFD_DOWN_TRAP , BFD CRTSESS , BFD DELSESS , BFD STACHG_TODWN , BFD STACHG_TOUP , OSPF NBRCHG , OSPF NBR_CHANGE_E , OSPF NBR_CHG_DOWN , OSPF NBR_DOWN_REASON , OSPF OGNLSA } 0.2523030 Global Fault Diagnosis Center

Visualization——Get the insight to fault Value 1 Filter unnecessary information 2 Statistical analysis of events

Anomaly Detection 1 Find the possible fault time Value 1 Find the possible fault time 2 Find the possible device 3 Find the possible module Router Traffic anomaly 17:20 Time Related log files 17:20 shutdown Cmd

Visualization—Event Summarization Get the event summarization between different events, and find the relationship between them.

Visualization—— Lag interval Time lag is a key feature of hidden temporal dependencies within sequential data.

Anomaly Detection——API Help the operators find the root cause KPI among a list of KPIs, and find the fault time.

Anomaly Detection——Multiple log files Interaction frequency matrix for ISIS protocol messages Output of the Rage Rank algorithm Find the root cause router based on the interaction of the protocol

Thank you Comments?