Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Incident and Problem Ticket Clustering and Classification Using Deep Learning
FENG Hailin, HAN Jing, HUANG Leijun, SHENG Ziwei, GONG Zican
ZTE Communications    2023, 21 (4): 69-77.   DOI: 10.12142/ZTECOM.202304009
Abstract23)   HTML5)    PDF (726KB)(20)       Save

A holistic analysis of problem and incident tickets in a real production cloud service environment is presented in this paper. By extracting different bags of words, we use principal component analysis (PCA) to examine the clustering characteristics of these tickets. Then K-means and latent Dirichlet allocation (LDA) are applied to show the potential clusters within this Cloud environment. The second part of our study uses a pre-trained bidirectional encoder representation from transformers (BERT) model to classify the tickets, with the goal of predicting the optimal dispatching department for a given ticket. Experimental results show that due to the unique characteristics of ticket description, pre-processing with domain knowledge turns out to be critical in both clustering and classification. Our classification model yields 86% accuracy when predicting the target dispatching department.

Table and Figures | Reference | Related Articles | Metrics
Log Anomaly Detection Through GPT-2 for Large Scale Systems
JI Yuhe, HAN Jing, ZHAO Yongxin, ZHANG Shenglin, GONG Zican
ZTE Communications    2023, 21 (3): 70-76.   DOI: 10.12142/ZTECOM.202303010
Abstract115)   HTML9)    PDF (537KB)(272)       Save

As the scale of software systems expands, maintaining their stable operation has become an extraordinary challenge. System logs are semi-structured text generated by the recording function in the source code and have important research significance in software service anomaly detection. Existing log anomaly detection methods mainly focus on the statistical characteristics of logs, making it difficult to distinguish the semantic differences between normal and abnormal logs, and performing poorly on real-world industrial log data. In this paper, we propose an unsupervised framework for log anomaly detection based on generative pre-training-2 (GPT-2). We apply our approach to two industrial systems. The experimental results on two datasets show that our approach outperforms state-of-the-art approaches for log anomaly detection.

Table and Figures | Reference | Related Articles | Metrics
Approach to Anomaly Detection in Microservice System with Multi- Source Data Streams
ZHANG Qixun, HAN Jing, CHENG Li, ZHANG Baisheng, GONG Zican
ZTE Communications    2022, 20 (3): 85-92.   DOI: 10.12142/ZTECOM.202203011
Abstract65)   HTML2)    PDF (679KB)(186)       Save

Microservices have become popular in enterprises because of their excellent scalability and timely update capabilities. However, while fine-grained modularity and service-orientation decrease the complexity of system development, the complexity of system operation and maintenance has been greatly increased, on the contrary. Multiple types of system failures occur frequently, and it is hard to detect and diagnose failures in time. Furthermore, microservices are updated frequently. Existing anomaly detection models depend on offline training and cannot adapt to the frequent updates of microservices. This paper proposes an anomaly detection approach for microservice systems with multi-source data streams. This approach realizes online model construction and online anomaly detection, and is capable of self-updating and self-adapting. Experimental results show that this approach can correctly identify 78.85% of faults of different types.

Table and Figures | Reference | Related Articles | Metrics
Feedback‑Aware Anomaly Detection Through Logs for Large‑Scale Software Systems
HAN Jing, JIA Tong, WU Yifan, HOU Chuanjia, LI Ying
ZTE Communications    2021, 19 (3): 88-94.   DOI: 10.12142/ZTECOM.202103011
Abstract46)   HTML3)    PDF (706KB)(56)       Save

One particular challenge for large?scale software systems is anomaly detection. System logs are a straightforward and common source of information for anomaly detection. Existing log?based anomaly detectors are unusable in real?world industrial systems due to high false?positive rates. In this paper, we incorporate human feedback to adjust the detection model structure to reduce false positives. We apply our approach to two industrial large?scale systems. Results have shown that our approach performs much better than state?of?the-art works with 50% higher accuracy. Besides, human feedback can reduce more than 70% of false positives and greatly improve detection precision.

Table and Figures | Reference | Related Articles | Metrics
A Case Study on Intelligent Operation System for Wireless Networks
LIU Jianwei, YUAN Yifei, HAN Jing
ZTE Communications    2019, 17 (4): 19-26.   DOI: 10.12142/ZTECOM.201904004
Abstract212)   HTML186)    PDF (1189KB)(208)       Save

The emerging fifth generation (5G) network has the potential to satisfy the rapidly growing traffic demand and promote the transformation of smartphone-centric networks into an Internet of Things (IoT) ecosystem. Due to the introduction of new communication technologies and the increased density of 5G cells, the complexity of operation and operational expenditure (OPEX) will become very challenging in 5G. Self-organizing network (SON) has been researched extensively since 2G, to cope with the similar challenge, however by predefined policies, rather than intelligent analysis. The requirement for better quality of experience and the complexity of 5G network demands call for an approach that is different from SON. In several recent studies, the combination of machine learning (ML) technology with SON has been investigated. In this paper, we focus on the intelligent operation of wireless network through ML algorithms. A comprehensive and flexible framework is proposed to achieve an intelligent operation system. Two use cases are also studied to use ML algorithms to automate the anomaly detection and fault diagnosis of key performance indicators (KPIs) in wireless networks. The effectiveness of the proposed ML algorithms is demonstrated by the real data experiments, thus encouraging the further research for intelligent wireless network operation.

Table and Figures | Reference | Related Articles | Metrics