+ All Categories
Home > Documents > Ppt for Seminar 1

Ppt for Seminar 1

Date post: 24-Oct-2014
Category:
Upload: sreeja-dodla-d
View: 63 times
Download: 11 times
Share this document with a friend
Popular Tags:
13
Project Title A Lightweight Algorithm for Message Type Extraction in Event Logs By D.DEEPTHI M. Tech CSE 10681D5803
Transcript
Page 1: Ppt for Seminar 1

Project Title

A Lightweight Algorithm for Message Type Extraction in

Event Logs

ByD.DEEPTHI

M. Tech CSE10681D5803

Page 2: Ppt for Seminar 1

ABSTRACTDay-to-Day we use computer for everything. Main thing

we depend on computers for computing.

For this purpose we build a large architecture of computers to do work for us. This architecture is maintain by the Qualified Persons i.e. System Administrator.

Every architecture will generate information about the working of it. So this information is termed as Events i.e. activities done in architecture.

Based on this events System Administrator has to take spot decision for the next action.

Page 3: Ppt for Seminar 1

INTRODUCTION Message type or message cluster extraction is an

important task in automatic pplication log analysis.

When the message types that exist in a log file are defined, they form the basis for carrying out other automatic application log analysis tasks.

In this paper we introduce a novel algorithm(IPLoM) for carrying out this task.

IPLoM( Iterative Partitioning Log Mining) works through a 4-step process is the proposed solution.

Page 4: Ppt for Seminar 1

EXISTING SYSTEM For every Architecture we get thousands of events are

generated.

For clustering this events previously they have designed algorithms like SLCT(Simple Log File Clustering Tool) and Log-hound for clustering the events automatically and discover the events.

But these algorithms do not match any frequent patterns discovered in event log files.

There are some other algorithms which are traditional clustering algorithms :CLIQUE, CURE, MAFIA which are only capable of clustering the high dimensional data but these algorithms can not able to deal with different attribute types.

Hence we proposed a new solution called IPLoM.

Page 5: Ppt for Seminar 1

PROPOSED SYSTEM The Proposed algorithm is IPLOM(Iterative Partitioning

Log Mining) a novel algorithm for the mining of event type patterns from event logs.

IPLOM not only finds frequent textual patterns,it also aims to find all possible patterns.

IPLOM works through 3 step partitioning process which divide events into respective clusters.

In fourth stage it produces the cluster description for each leaf partition of the events.

Page 6: Ppt for Seminar 1

MODULES There are 5 modules in this project, those are :1.File_Prune Function2.Partition by Event Size3.Partition by Token Position4.Partition by Search For Bijection5.Discover Message Type Descriptions From Each

Partition.

Page 7: Ppt for Seminar 1

MODULE – 1 (File_ Prune Function)

This module is used to check whether the token are within the size or not if not the event will remove from the event log file.

Page 8: Ppt for Seminar 1

MODULE – 2 (Partition By Event Size)

This module is used to check event size. As depends on the token size we are dividing the total events into clusters of their sizes.

Page 9: Ppt for Seminar 1

MODULE –3 (Partition By Token Position)

This Module is used to divide the events based on the token position in the message with the comparing of the token in the message.

Page 10: Ppt for Seminar 1

MODULE -4 (Partition By Search For

Bijection) This Module is used to divide the events based on the

1:1, 1:M, M:1, M:M. So this will help to extract the message easier from the event log file.

Page 11: Ppt for Seminar 1

MODULE -5(Discover Message Type Descriptions From Each Partition)

By implementing the above all the module message is extracted from the event log file. Here we need to give the message type descriptions for the events in the clusters.

Page 12: Ppt for Seminar 1

Hardware & Software Requirements HARDWARE :

Monitor : 15 inches Hard disk : 40Gb Mouse : general Keyboard : 108 keys Processor : Pentium 4 SOFTWARE : Framework : Dotnet 3.5 Language : C#.net IDE : Visual Studio 2008 Database : Sql Server 2005

Page 13: Ppt for Seminar 1

REFERENCES[1] J. O. Kephart and D. M. Chess, \The Vision of Autonomic

Computing, "Computer, Monthly publication of the IEEE Computer Society”, vol. 36, pp.41{ 50, June 2003.

[2] M. Klemettinen, \A Knowledge Discovery Methodology for Telecommunications Network Alarm Databases," Ph.D. dissertation, University of Helsinki, 1999.

[3] S. Ma, , and J. Hellerstein, \Mining Partially Periodic Event Patterns with Unknown Periods," in Proceedings of the 16th International Conference on Data Engineering, 2000, pp. 205{214}.

[4] Q. Zheng, K. Xu, W. Lv, and S. Ma, \Intelligent Search for Correlated Alarm from Database Containing Noise Data," in Proceedings of the 8th IEEE/IFIP Network Operations and Management Symposium (NOMS), 2002, pp. 405{419}.

[5] J. Stearley, \Towards Informatic Analysis of Syslogs," in Proceedings on the 2004 IEEE International Conference on Cluster Computing, 2004, pp.309{318}.


Recommended