System Failure Detection and Diagnosis by Analyzing Syslog and SNS Data: Applying Big Data Analysis to Network Operations

Authors:

D. Vimala,I. MaryLinda,

DOI NO:

https://doi.org/10.26782/jmcms.spl.2019.08.00007

Keywords:

Big data,syslog,network failure detection,

Abstract

We present two major information examination strategies for diagnosing the reasons for system disappointments and for identifying system disappointments early. Syslogs contain log information created by the framework. We dissected syslogs what's more, prevailing with regards to distinguishing the reason for a system disappointment via consequently learning more than 100 million logs without requiring any past learning of log information. Investigation of the information of an interpersonal interaction benefit (in particular, Twitter) empowered us to recognize conceivable system disappointments by extricating system disappointment related tweets, which represent under 1% of all tweets, continuously and with high exactness.

Refference:

I. Anuradha.C, Khanna.V, “Improving network performance and security in WSN using decentralized hypothesis testing “Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016 .
II. Anuradha.C, Khanna.V, “A novel gsm based control for e-devices “Journal of Chemical and Pharmaceutical Sciences(JCPS)
Volume 9 Issue 2, April – June 2016
III. Kavitha, R., Nedunchelian, R., “Domain-specific Search engine optimization using healthcare ontology and a neural network backpropagation approach”, 2017, Research Journal of Biotechnology, Special Issue 2:157-166
IV. Kavitha, G., Kavitha, R., “An analysis to improve throughput of high power hubs in mobile ad hoc network” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 361-363
IV. Kavitha, G., Kavitha, R., “Dipping interference to supplement throughput in MANET” , 2016, Journal of Chemical and
Pharmaceutical Sciences, Vol-9, Issue-2: 357-360
V. Pothumani, S., Sriram, M., Sridhar, J., Arul Selvan, G., “Secure mobile agents communication on intranet, Journal of Chemical and Pharmaceutical Sciences”, volume 9, Issue 3, Pg No S32-S35, 2016
VI. Pothumani, S., Sriram, M., Sridhar , “Various schemes for database encryption-a survey”, Journal of Chemical and Pharmaceutical Sciences, volume 9, Issue 3, Pg NoS103-S106, 2016
VII. Priya, N.,Sridhar,J.,Sriram, M.“Vehicularcloudcomputing security issues and solutions” Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016
VIII. Priya, N., Sridhar, J., Sriram, M. “Mobile large data storage security in cloud computing environment-a new approach” JCPS Volume9 Issue 2. April – June 2016

View | Download