Method for characterizing system state using message logs
First Claim
Patent Images
1. A method comprising compiling a first message log based, at least in part, on:
- (i) a second message log that comprises a first message A and a second message B,(ii) a dis-similarity distance Δ
between the morphology of the first message A and the morphology of the second message B; and
characterizing system state based on an incidence of anomalies indicated by the first message log,wherein the first message and the second message regard tracking of actions of at least one of communication nodes and communication links of a telecommunication system,wherein the first message and the second message are stored in a respective memory of the telecommunication system, andwherein the dis-similarity distance is based, at least in part, on;
(i) a first dis-similarity distance Δ
1 between a first sub-string of the first message S1(A) and a first sub-string of the second message S1(B),(ii) a second dis-similarity distance Δ
2 between a second sub-string of the first message S2(A) and a second sub-string of the second message S2(B),(iii) a first weighting W1 of the first dis-similarity distance Δ
2, and(iv) a second weighting W2 of the dis-similarity distance Δ
2,wherein Δ
=f(Δ
1, W1, Δ
2, W2).
23 Assignments
0 Petitions
Accused Products
Abstract
A method that enables the run-time behavior of a system to be analyzed is disclosed. By analyzing the totality of the messages in the log or logs system behavior can be better understood. The illustrative embodiment of the present invention detects patterns in message logs, clusters similar messages, and determines system behavior based on the clustering of messages.
-
Citations
23 Claims
-
1. A method comprising compiling a first message log based, at least in part, on:
-
(i) a second message log that comprises a first message A and a second message B, (ii) a dis-similarity distance Δ
between the morphology of the first message A and the morphology of the second message B; andcharacterizing system state based on an incidence of anomalies indicated by the first message log, wherein the first message and the second message regard tracking of actions of at least one of communication nodes and communication links of a telecommunication system, wherein the first message and the second message are stored in a respective memory of the telecommunication system, and wherein the dis-similarity distance is based, at least in part, on; (i) a first dis-similarity distance Δ
1 between a first sub-string of the first message S1(A) and a first sub-string of the second message S1(B),(ii) a second dis-similarity distance Δ
2 between a second sub-string of the first message S2(A) and a second sub-string of the second message S2(B),(iii) a first weighting W1 of the first dis-similarity distance Δ
2, and(iv) a second weighting W2 of the dis-similarity distance Δ
2,wherein Δ
=f(Δ
1, W1, Δ
2, W2). - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method comprising compiling a first message log based on a clustering of messages in a second message log;
- and
characterizing system state based on the occurrence of a first cluster in the first message log, wherein the clustering of messages is based, at least in part, on the dis-similarity distance of a plurality of messages, the plurality of messages comprising a first message A and a second message B, wherein the messages regard tracking of actions of at least one of communication nodes and communication links of a telecommunication system, wherein the messages are stored in a respective memory of the telecommunication system, and wherein the dis-similarity distance is based, at least in part, on; (i) a first dis-similarity distance Δ
1 between a first sub-string of the first message S1(A) and a first sub-string of the second message S1(B),(ii) a second dis-similarity distance Δ
2 between a second sub-string of the first message S2(A) and a second sub-string of the second message S2(B),(iii) a first weighting W1 of the first dis-similarity distance Δ
2, and(iv) a second weighting W2 of the dis-similarity distance Δ
2,wherein Δ
=f(Δ
1, W1, Δ
2, W2). - View Dependent Claims (7, 8, 9, 10, 11, 12, 13, 14, 15)
- and
-
16. A method comprising:
-
generating a first cluster of messages based on a dis-similarity distance between a first message A and a second message B in a first message log, and characterizing system state based on the incidence of the first cluster of messages at a first time interval and the incidence of the cluster of messages at a second time interval, wherein the first message and the second message regard tracking of actions of at least one of communication nodes and communication links of a telecommunication system, wherein the first message and the second message are stored in a respective memory of the telecommunication system, and wherein the dis-similarity distance is based, at least in part, on; (i) a first dis-similarity distance Δ
1 between a first sub-string of the first message S1(A) and a first sub-string of the second message S1(B),(ii) a second dis-similarity distance Δ
2 between a second sub-string of the first message S2(A) and a second sub-string of the second message S2(B),(iii) a first weighting W1 of the first dis-similarity distance Δ
2, and(iv) a second weighting W2 of the dis-similarity distance Δ
2,wherein Δ
=f(Δ
1, W1, Δ
2, W2). - View Dependent Claims (17, 18, 19, 20, 21, 22, 23)
-
Specification