Cusum techniques for timeslot sequences with applications to network surveillance

被引:22
|
作者
Jeske, Daniel R. [1 ]
De Oca, Veronica Montes [1 ]
Bischoff, Wolfgang [2 ]
Marvasti, Mazda
机构
[1] Univ Calif Riverside, Dept Stat, Riverside, CA 92521 USA
[2] Catholic Univ Eichstaett Ingolstadt, Fac Math & Geog, Ingolstadt, Germany
关键词
CHANGE-POINT DETECTION; QUALITY-CONTROL;
D O I
10.1016/j.csda.2009.05.029
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
We develop two cusum, change-point detection algorithms for data network monitoring applications where numerous and various performance and reliability metrics are available to aid with the early identification of realized or impending failures. We confront three significant challenges with our cusum algorithms: (1) the need for nonparametric techniques so that a wide variety of metrics can be included in the monitoring process, (2) the need to handle time varying distributions for the metrics that reflect natural cycles in work load and traffic patterns, and (3) the need to be computationally efficient with the massive amounts of data that are available for processing. The only critical assumption we make when developing the algorithms is that suitably transformed observations within a defined timeslot structure are independent and identically distributed under normal operating conditions. To facilitate practical implementations of the algorithms, we present asymptotically valid thresholds. Our research was motivated by a real-world application and we use that context to guide the design of a simulation study that examines the sensitivity of the cusum algorithms. (C) 2009 Elsevier B.V. All rights reserved.
引用
收藏
页码:4332 / 4344
页数:13
相关论文
共 50 条
  • [31] Distributed Cognitive Sensor Network Approach for Surveillance Applications
    Bixio, Luca
    Ciardelli, Lorenzo
    Ottonello, Marina
    Regazzoni, Carlo S.
    AVSS: 2009 6TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED VIDEO AND SIGNAL BASED SURVEILLANCE, 2009, : 232 - 237
  • [32] Automatic profiling of network event sequences: Algorithm and applications
    Meng, Xiaoqiao
    Jiang, Guofei
    Zhang, Hui
    Chen, Haifeng
    Yoshihira, Kenji
    27TH IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (INFOCOM), VOLS 1-5, 2008, : 852 - 860
  • [33] Matching sequences of graphs with applications in computer network analysis
    Bunke, H
    Dickinson, PJ
    Kraetzl, M
    8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL III, PROCEEDINGS: COMMUNICATION AND NETWORK SYSTEMS, TECHNOLOGIES AND APPLICATIONS, 2004, : 270 - 275
  • [34] CUSUM multi-chart for detecting unknown abrupt changes under finite measure space for network observation sequences
    Qiao, Lei
    Han, Dong
    STATISTICS, 2021, 55 (03) : 489 - 513
  • [35] Network coding techniques for VANET advertising applications
    Shereen A. M. Ahmed
    Sharifah H. S. Ariffin
    Norsheila Fisal
    EURASIP Journal on Wireless Communications and Networking, 2015
  • [36] Network coding techniques for VANET advertising applications
    Ahmed, Shereen A. M.
    Ariffin, Sharifah H. S.
    Fisal, Norsheila
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2015,
  • [37] Neural network classification techniques for UXO applications
    Gifford, M
    Foley, JE
    PROCEEDINGS OF THE SYMPOSIUM ON THE APPLICATION OF GEOPHYSICS TO ENGINEERING AND ENVIRONMENTAL PROBLEMS, 1996, : 701 - 710
  • [38] Maximizing UAV network communication capacity: joint optimization of network topology and timeslot resource allocation
    Zhang, Jing
    Ding, Jianxun
    Huang, Zixuan
    Sun, Bingyu
    Long, Jiancheng
    INTERNATIONAL JOURNAL OF GENERAL SYSTEMS, 2025,
  • [39] REAL-TIME FOREGROUND SEGMENTATION FOR SURVEILLANCE APPLICATIONS IN NRCS LIDAR SEQUENCES
    Kovacs, Lorant
    Kegl, Marcell
    Benedek, Csaba
    XXIV ISPRS CONGRESS CONGRESS IMAGING TODAY, FORESEEING TOMORROW, COMMISSION I, 2022, 43-B1 : 45 - 51
  • [40] WAVE-CUSUM: Improving CUSUM performance in network anomaly detection by means of wavelet analysis
    Callegari, C.
    Giordano, S.
    Pagano, M.
    Pepe, T.
    COMPUTERS & SECURITY, 2012, 31 (05) : 727 - 735