XStream: Explaining Anomalies in Event Stream Monitoring
نویسندگان
چکیده
In this paper, we present the XStream system that provides high-quality explanations for anomalous behaviors that users annotate on CEP-based monitoring results. Given the new requirements for explanations, namely, conciseness, consistency with human interpretation, and prediction power, most existing techniques cannot produce explanations that satisfy all three of them. The key technical contributions of this work include a formal definition of optimally explaining anomalies in CEP monitoring, and three key techniques for generating su cient feature space, characterizing the contribution of each feature to the explanation, and selecting a small subset of features as the optimal explanation, respectively. Evaluation using two real-world use cases shows that XStream can outperform existing techniques significantly in conciseness and consistency while achieving comparable high prediction power and retaining a highly e cient implementation of a data stream system.
منابع مشابه
EXstream: Explaining Anomalies in Event Stream Monitoring
In this paper, we present the EXstream system that provides high-quality explanations for anomalous behaviors that users annotate on CEP-based monitoring results. Given the new requirements for explanations, namely, conciseness, consistency with human interpretation, and prediction power, most existing techniques cannot produce explanations that satisfy all three of them. The key technical cont...
متن کاملSeparation of Geochemical Anomalies Using Factor Analysis and Concentration-Number (C-N) Fractal Modeling Based on Stream Sediments Data in Esfordi 1:100000 Sheet, Central Iran
The aim of this study is separation of Fe2O3, TiO2 and V2O5 anomalies in Esfordi 1:100,000 sheet which is located in Bafq district, Central Iran. The analyzed elements of stream sediment samples taken in the area can be classified into 5 groups (factors) by factor analysis. The Concentration–Number (C-N) fractal model was used for delineation of the Fe2O3, TiO2 and V2O5 thresholds. According to...
متن کاملMastering Security Anomalies in Virtualized Computing Environments via Complex Event Processing
To protect computer systems and their users against security attacks, all potential security related incidents should be detected by monitoring system behavior. In this paper, a novel approach to detect, analyze and handle security anomalies in virtualized computing systems is presented. Adequate sensors on different virtualization layers monitor relevant events, a Complex Event Processing engi...
متن کاملUsing stream sediment data to determine geochemical anomalies by statistical analysis and fractal modeling in Tafrash Region, Central Iran
Iranian Cenozoic magmatic belt, known as Urumieh-Dokhtar, is recognized as an important polymetallic mineralization which hosts porphyry, epithermal, and polymetallic skarn deposits. In this regard, multivariate analyses are generally used to extract significant anomalous geochemical signature of the mineral deposits. In this study, stepwise factor analysis, cluster analysis, and concentration–...
متن کاملApplication of continuous restricted Boltzmann machine to detect multivariate anomalies from stream sediment geochemical data, Korit, East of Iran
Anomaly separation using stream sediment geochemical data has an essential role in regional exploration. Many different techniques have been proposed to distinguish anomalous from study area. In this research, a continuous restricted Boltzmann machine (CRBM), which is a generative stochastic artificial neural network, was used to recognize the mineral potential area in Korit 1:100000 sheet, loc...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017