TempOpt - Unsupervised Alarm Relation Learning for Telecommunication Networks
- URL: http://arxiv.org/abs/2508.08814v2
- Date: Wed, 13 Aug 2025 07:28:25 GMT
- Title: TempOpt - Unsupervised Alarm Relation Learning for Telecommunication Networks
- Authors: Sathiyanaryanan Sampath, Pratyush Uppuluri, Thirumaran Ekambaram,
- Abstract summary: In a telecommunications network, fault alarms generated by network nodes are monitored in a Network Operations Centre.<n>The monitoring process comprises of tasks such as active alarms analysis, root alarm identification, and resolution of the underlying problem.<n>We propose a novel unsupervised alarm relation learning technique that is practical and overcomes the limitations of an existing class of alarm relational learning method-temporal dependency methods.
- Score: 0.0
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: In a telecommunications network, fault alarms generated by network nodes are monitored in a Network Operations Centre (NOC) to ensure network availability and continuous network operations. The monitoring process comprises of tasks such as active alarms analysis, root alarm identification, and resolution of the underlying problem. Each network node potentially can generate alarms of different types, while nodes can be from multiple vendors, a network can have hundreds of nodes thus resulting in an enormous volume of alarms at any time. Since network nodes are inter-connected, a single fault in the network would trigger multiple sequences of alarms across a variety of nodes and from a monitoring point of view, it is a challenging task for a NOC engineer to be aware of relations between the various alarms, when trying to identify, for example, a root alarm on which an action needs to be taken. To effectively identify root alarms, it is essential to learn relation among the alarms for accurate and faster resolution. In this work we propose a novel unsupervised alarm relation learning technique Temporal Optimization (TempOpt) that is practical and overcomes the limitations of an existing class of alarm relational learning method-temporal dependency methods. Experiments have been carried on real-world network datasets, that demonstrate the improved quality of alarm relations learned by TempOpt as compared to temporal dependency method.
Related papers
- Distributed Link Sparsification for Scalable Scheduling Using Graph Neural Networks (Journal Version) [50.894272363373126]
In wireless networks characterized by dense connectivity, the significant signaling overhead generated by distributed link scheduling algorithms can exacerbate issues like congestion, energy consumption, and radio footprint expansion.<n>We propose a distributed link sparsification scheme employing graph neural networks (GNNs) to reduce scheduling overhead for delay-tolerant traffic while maintaining network capacity.<n>A GNN module is trained to adjust contention thresholds for individual links based on traffic statistics and network topology, enabling links to withdraw from scheduling contention when they are unlikely to succeed.
arXiv Detail & Related papers (2025-09-05T18:59:14Z) - One-Class Intrusion Detection with Dynamic Graphs [46.453758431767724]
Machine learning-based intrusion detection constitutes a promising approach for improving security.<n>We propose a novel intrusion detection method, TGN-SVDD, which builds upon modern dynamic graph modelling and deep anomaly detection.<n>We demonstrate its superiority over several baselines for realistic intrusion detection data and suggest a more challenging variant of the latter.
arXiv Detail & Related papers (2025-08-18T12:36:55Z) - Unsupervised Network Anomaly Detection with Autoencoders and Traffic Images [1.0589208420411014]
We propose an image-based representation of network traffic which allows to realize a compact summary of the current network conditions.<n>We also present an unsupervised learning approach which effectively detects the presence of anomalies.
arXiv Detail & Related papers (2025-05-22T13:19:30Z) - Task-Oriented Communications for NextG: End-to-End Deep Learning and AI
Security Aspects [78.84264189471936]
NextG communication systems are beginning to explore shifting this design paradigm to reliably executing a given task such as in task-oriented communications.
Wireless signal classification is considered as the task for the NextG Radio Access Network (RAN), where edge devices collect wireless signals for spectrum awareness and communicate with the NextG base station (gNodeB) that needs to identify the signal label.
Task-oriented communications is considered by jointly training the transmitter, receiver and classifier functionalities as an encoder-decoder pair for the edge device and the gNodeB.
arXiv Detail & Related papers (2022-12-19T17:54:36Z) - Alarm-Based Root Cause Analysis in Industrial Processes Using Deep
Learning [0.0]
This research aims to model the relations between industrial alarms using historical alarm data in the database.
As a case study, the proposed model is implemented in the well-known Tennessee Eastman process.
arXiv Detail & Related papers (2022-03-21T20:10:48Z) - Detection of Correlated Alarms Using Graph Embedding [0.0]
This paper tries to present a novel method for detecting correlated alarms based on artificial intelligence methods.
The proposed method is based on graph embedding and alarm clustering, resulting in the detection of correlated alarms.
arXiv Detail & Related papers (2022-01-17T05:50:45Z) - Network Activities Recognition and Analysis Based on Supervised Machine
Learning Classification Methods Using J48 and Na\"ive Bayes Algorithm [1.6181085766811525]
The application of machine learning methods based on supervised classification technology would help liberate the network security staff from the heavy and boring tasks.
A finetuned model would accurately recognize user behavior, which could provide persistent monitoring with a relative high accuracy and good adaptability.
arXiv Detail & Related papers (2021-05-28T09:44:14Z) - Better than the Best: Gradient-based Improper Reinforcement Learning for
Network Scheduling [60.48359567964899]
We consider the problem of scheduling in constrained queueing networks with a view to minimizing packet delay.
We use a policy gradient based reinforcement learning algorithm that produces a scheduler that performs better than the available atomic policies.
arXiv Detail & Related papers (2021-05-01T10:18:34Z) - Few-shot Network Anomaly Detection via Cross-network Meta-learning [45.8111239825361]
We propose a new family of graph neural networks -- Graph Deviation Networks (GDN)
GDN can leverage a small number of labeled anomalies for enforcing statistically significant deviations between abnormal and normal nodes on a network.
We equip the proposed GDN with a new cross-network meta-learning algorithm to realize few-shot network anomaly detection.
arXiv Detail & Related papers (2021-02-22T16:42:37Z) - Unsupervised Learning for Asynchronous Resource Allocation in Ad-hoc
Wireless Networks [122.42812336946756]
We design an unsupervised learning method based on Aggregation Graph Neural Networks (Agg-GNNs)
We capture the asynchrony by modeling the activation pattern as a characteristic of each node and train a policy-based resource allocation method.
arXiv Detail & Related papers (2020-11-05T03:38:36Z) - Automating Botnet Detection with Graph Neural Networks [106.24877728212546]
Botnets are now a major source for many network attacks, such as DDoS attacks and spam.
In this paper, we consider the neural network design challenges of using modern deep learning techniques to learn policies for botnet detection automatically.
arXiv Detail & Related papers (2020-03-13T15:34:33Z) - Pelican: A Deep Residual Network for Network Intrusion Detection [7.562843347215287]
We propose a deep neural network, Pelican, that is built upon specially-designed residual blocks.
Pelican can achieve a high attack detection performance while keeping a much low false alarm rate.
arXiv Detail & Related papers (2020-01-19T05:07:48Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.